Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:8886: Red Hat Security Advisory: redhat-ds:11 security, bug fix, and enhancement update

An update for the redhat-ds:11 module is now available for Red Hat Directory Server 11.5 for RHEL 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-2850: 389-ds-base: SIGSEGV in sync_repl
Red Hat Security Data
#vulnerability#web#linux#red_hat#nodejs#js#java#kubernetes#ldap#aws#ssl

Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager

All Products

Issued:

2022-12-07

Updated:

2022-12-07

RHSA-2022:8886 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: redhat-ds:11 security, bug fix, and enhancement update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for the redhat-ds:11 module is now available for Red Hat Directory Server 11.5 for RHEL 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat Directory Server is an LDAPv3-compliant directory server. The suite of packages includes the Lightweight Directory Access Protocol (LDAP) server, as well as command-line utilities and Web UI packages for server administration.

Security Fix(es):

  • 389-ds-base: SIGSEGV in sync_repl (CVE-2022-2850)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • broken nsslapd-subtree-rename-switch option in rhds11 (BZ#2098140)

Affected Products

  • Red Hat Directory Server 11 x86_64

Fixes

  • BZ - 2098140 - broken nsslapd-subtree-rename-switch option in rhds11
  • BZ - 2118691 - CVE-2022-2850 389-ds-base: SIGSEGV in sync_repl

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://access.redhat.com/security/updates/classification/#

Red Hat Directory Server 11

SRPM

389-ds-base-1.4.3.29-7.module+el8dsrv+17334+74991258.src.rpm

SHA-256: a841c9bd2309f1212c31488587cc5a4d9e9b160a99fa8af96a21c14f554d651f

x86_64

389-ds-base-1.4.3.29-7.module+el8dsrv+17334+74991258.x86_64.rpm

SHA-256: 41dd4b00f151316380d16570e36b46478ccc04223b03720c2f4274e9580af960

389-ds-base-debuginfo-1.4.3.29-7.module+el8dsrv+17334+74991258.x86_64.rpm

SHA-256: 036dc36f65900ab0a09f999c23fe231d0e1e3e11001244b3ec8ad2d0d364c46e

389-ds-base-debugsource-1.4.3.29-7.module+el8dsrv+17334+74991258.x86_64.rpm

SHA-256: 634bc73e6bb5c9aa742bafbe48f0a8b130722d947e40fd2f774356ae19f23291

389-ds-base-devel-1.4.3.29-7.module+el8dsrv+17334+74991258.x86_64.rpm

SHA-256: 2d2243c27d106fce6ce1a26894e89e33d6854ba25554901745f85fb31398da9f

389-ds-base-legacy-tools-1.4.3.29-7.module+el8dsrv+17334+74991258.x86_64.rpm

SHA-256: 8d25cdff78dc11d5e491e6308f3ab886cb7f9f03a5449410bc49f70c3f70c3ae

389-ds-base-legacy-tools-debuginfo-1.4.3.29-7.module+el8dsrv+17334+74991258.x86_64.rpm

SHA-256: 410031daa2c0e20705c33903255476f65ad47919c830f2e80d0c5a8336edcbd6

389-ds-base-libs-1.4.3.29-7.module+el8dsrv+17334+74991258.x86_64.rpm

SHA-256: da8f2b12e3bb662d28f5de12654315116a0178ab47aa6ca74ece00377e9db767

389-ds-base-libs-debuginfo-1.4.3.29-7.module+el8dsrv+17334+74991258.x86_64.rpm

SHA-256: ddefb6d8e858c0221e8c20f792c0699980ebba6b87e6011742cf381bf3ebfd30

389-ds-base-snmp-1.4.3.29-7.module+el8dsrv+17334+74991258.x86_64.rpm

SHA-256: a1d8f9d81e0d0919439ac58f6b3e81ccd639f7f36e891b9f0ad4a5467cab8bad

389-ds-base-snmp-debuginfo-1.4.3.29-7.module+el8dsrv+17334+74991258.x86_64.rpm

SHA-256: e4f1f8f66d9b8616448c1d57693a54ad11c763ab9ba642fa678b600bc107bc9b

cockpit-389-ds-1.4.3.29-7.module+el8dsrv+17334+74991258.noarch.rpm

SHA-256: 720ace302f8eba4629ae93aca833e93d180f51d3dc868297b342c39be2edf795

python3-lib389-1.4.3.29-7.module+el8dsrv+17334+74991258.noarch.rpm

SHA-256: 3c0bb762b68abfe83a0c811b61a92e10050c4bf140ad360e0fa7b208f8c2634a

The Red Hat security contact is [email protected]. More contact details at https://access.redhat.com/security/team/contact/.

Related news

Red Hat Security Advisory 2023-0479-01

Red Hat Security Advisory 2023-0479-01 - Red Hat Directory Server is an LDAPv3-compliant directory server. The suite of packages includes the Lightweight Directory Access Protocol server, as well as command-line utilities and Web UI packages for server administration.

RHSA-2022:8976: Red Hat Security Advisory: 389-ds-base security update

An update for 389-ds-base is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0918: 389-ds-base: sending crafted message could result in DoS * CVE-2022-0996: 389-ds-base: expired password was still allowed to access the database * CVE-2022-2850: 389-ds-base: SIGSEGV in sync_repl

Red Hat Security Advisory 2022-8680-01

Red Hat Security Advisory 2022-8680-01 - 389 Directory Server is an LDAP version 3 compliant server. The base packages include the Lightweight Directory Access Protocol server and command-line utilities for server administration.

RHSA-2022:8680: Red Hat Security Advisory: 389-ds:1.4 security update

An update for the 389-ds:1.4 module is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2850: 389-ds-base: SIGSEGV in sync_repl

Red Hat Security Advisory 2022-8162-01

Red Hat Security Advisory 2022-8162-01 - 389 Directory Server is an LDAP version 3 compliant server. The base packages include the Lightweight Directory Access Protocol server and command-line utilities for server administration. Issues addressed include denial of service and memory leak vulnerabilities.

RHSA-2022:8162: Red Hat Security Advisory: 389-ds-base security, bug fix, and enhancement update

An update for 389-ds-base is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0918: 389-ds-base: sending crafted message could result in DoS * CVE-2022-0996: 389-ds-base: expired password was still allowed to access the database * CVE-2022-2850: 389-ds-base: SIGSEGV in sync_repl

Red Hat Security Advisory 2022-7133-01

Red Hat Security Advisory 2022-7133-01 - 389 Directory Server is an LDAP version 3 compliant server. The base packages include the Lightweight Directory Access Protocol server and command-line utilities for server administration.

Red Hat Security Advisory 2022-7087-01

Red Hat Security Advisory 2022-7087-01 - 389 Directory Server is an LDAP version 3 compliant server. The base packages include the Lightweight Directory Access Protocol server and command-line utilities for server administration.

RHSA-2022:7133: Red Hat Security Advisory: 389-ds:1.4 security update

An update for the 389-ds:1.4 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2850: 389-ds-base: SIGSEGV in sync_repl

RHSA-2022:7087: Red Hat Security Advisory: 389-ds-base security and bug fix update

An update for 389-ds-base is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2850: 389-ds-base: SIGSEGV in sync_repl

CVE-2022-2850: Invalid Bug ID

A flaw was found In 389-ds-base. When the Content Synchronization plugin is enabled, an authenticated user can reach a NULL pointer dereference using a specially crafted query. This flaw allows an authenticated attacker to cause a denial of service. This CVE is assigned against an incomplete fix of CVE-2021-3514.