- Issued:
- 2024-05-21
- Updated:
- 2024-05-21
RHEA-2024:2934 - Product Enhancement Advisory
Synopsis
redhat-ds:11 bug fix and enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Red Hat Directory Server 11.9 is now available.
Description
Red Hat Directory Server is an LDAPv3-compliant directory server. The suite of packages includes the Lightweight Directory Access Protocol (LDAP) server, as well as command-line utilities and Web UI packages for server administration.
This release provides a number of bug fixes and enhancements. For detailed information on changes in this release, see the Red Hat Directory Server 11 Release Notes linked from the References section.
Users of Red Hat Directory Server 11 are advised to upgrade to these updated packages.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Directory Server 11.9 x86_64
Fixes
- BZ - 2239787 - RHDS Console - Failing to show entries with certificate in the Table View.
- BZ - 2256711 - ns-slapd buffer overflow detected
- BZ - 2257790 - Attribute Names changed to lowercase after adding the Attributes.
- BZ - 2258822 - Rebase RHDS 11.9 with 389-ds-base-1.4.3.39
- BZ - 2264534 - RHDS LDAP server Segmentation fault, apparent heap corruption, crashes in OpenSSL after SSL_do_handshake
- BZ - 2268177 - RHDS-11 investigate long etime and error "Retry cound exceeded' on BIND/ADD/DEL/MOD from revert_cache [11.9]
CVEs
(none)
Red Hat Directory Server 11.9
SRPM | |
---|---|
389-ds-base-1.4.3.39-3.module+el8dsrv+21677+4b22807b.src.rpm | SHA-256: c21553969bdfa57f4bd31e31f1f61b1c82939ad1a9c45081c9bdc5f48cc00a99 |
x86_64 | |
389-ds-base-1.4.3.39-3.module+el8dsrv+21677+4b22807b.x86_64.rpm | SHA-256: 9b74d8e75a29d3c1f7370594dcde793c2d0923f069759c545e3d803d6ff528fd |
389-ds-base-debuginfo-1.4.3.39-3.module+el8dsrv+21677+4b22807b.x86_64.rpm | SHA-256: 895c81e17dba4d4eb52a4e3deaef1afa88e77ac9f9d54d455d6d9214f720b915 |
389-ds-base-debugsource-1.4.3.39-3.module+el8dsrv+21677+4b22807b.x86_64.rpm | SHA-256: c7b740341f719a853f6796c1f13316b160f0d72126445b6ea15cf2f043ed9983 |
389-ds-base-devel-1.4.3.39-3.module+el8dsrv+21677+4b22807b.x86_64.rpm | SHA-256: 80617d17a4f31ffe56b9b3ef783f072d17bf1819db34f9db357e2b1662716a20 |
389-ds-base-legacy-tools-1.4.3.39-3.module+el8dsrv+21677+4b22807b.x86_64.rpm | SHA-256: 66a0ac020746f72d785d37f5195bf75504b165286243c1607dde8722365be187 |
389-ds-base-legacy-tools-debuginfo-1.4.3.39-3.module+el8dsrv+21677+4b22807b.x86_64.rpm | SHA-256: ae977632b5289c66dde9e69e29056a08a00f6947efc9d63778e14070661b2297 |
389-ds-base-libs-1.4.3.39-3.module+el8dsrv+21677+4b22807b.x86_64.rpm | SHA-256: e0f3f5b67fcc72b1b474f71c2eb13a4ba238ec332491cdd34dc7d6f1e61bf82a |
389-ds-base-libs-debuginfo-1.4.3.39-3.module+el8dsrv+21677+4b22807b.x86_64.rpm | SHA-256: 1ee0c74726f2dd39c05e8fbe254f6630832ff061b34f4650398b4048f4a96f83 |
389-ds-base-snmp-1.4.3.39-3.module+el8dsrv+21677+4b22807b.x86_64.rpm | SHA-256: dd10759d1b2c4f95c6fcb073c103acb7435fcc5fc153c6e18487672238f73a21 |
389-ds-base-snmp-debuginfo-1.4.3.39-3.module+el8dsrv+21677+4b22807b.x86_64.rpm | SHA-256: aabebb1ee296e700d9a7c38ec17c0f786054986a2d89723f6d7863cfcb03daf9 |
cockpit-389-ds-1.4.3.39-3.module+el8dsrv+21677+4b22807b.noarch.rpm | SHA-256: 7568b22f21ccf289bb02326f672a07bd402dae1bc3b710b5957c38ce8102250e |
python3-lib389-1.4.3.39-3.module+el8dsrv+21677+4b22807b.noarch.rpm | SHA-256: a8ea121355536c26b9423d460a4059254a305974ed426ae4a4da51e2d36af33b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.