Back to bug 2091781

Who When What Removed Added
Sandipan Roy 2022-05-31 04:00:25 UTC CC abokovoy, emartyny, mreynolds, spichugi, tbordaz, vashirov
Sandipan Roy 2022-05-31 04:10:42 UTC Summary 389-ds-base: access control bypass by filter in LDAP terms CVE-2022-1949 389-ds-base: access control bypass by filter in LDAP terms
Alias CVE-2022-1949
Sandipan Roy 2022-05-31 04:14:18 UTC Summary CVE-2022-1949 389-ds-base: access control bypass by filter in LDAP terms CVE-2022-1949 389-ds-base: access control bypass by query (filter in LDAP terms) optimiser
Sandipan Roy 2022-05-31 04:16:00 UTC Blocks 2091784
Sandipan Roy 2022-05-31 04:20:24 UTC Depends On 2091788, 2091787, 2091786
William Brown 2022-05-31 04:33:25 UTC CC william
Sandipan Roy 2022-05-31 04:40:01 UTC Depends On 2091792, 2091791, 2091790, 2091793
Têko Mihinto 2022-05-31 14:24:29 UTC CC tmihinto
Borja Tarraso 2022-06-02 12:57:14 UTC Doc Text A flaw was found in 389-ds-base package where some LDAP queries can cause performance issues. An attacker can take advantage of this by sending a non-optimal searches which could cause serious performance issues within the directory server.
RaTasha Tillery-Smith 2022-06-02 14:29:51 UTC Doc Text A flaw was found in 389-ds-base package where some LDAP queries can cause performance issues. An attacker can take advantage of this by sending a non-optimal searches which could cause serious performance issues within the directory server. A flaw was found in the 389-ds-base package where some LDAP queries can cause performance issues. This flaw allows an attacker to send a non-optimal search that causes serious performance issues within the directory server.
Matthew Harmsen 2023-03-03 01:00:25 UTC CC idm-ds-dev-bugs
Matthew Harmsen 2023-03-03 01:02:15 UTC CC ldap-maint
Red Hat Bugzilla 2023-07-07 08:34:05 UTC Assignee security-response-team nobody

Back to bug 2091781