Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2019:1789 - Security Advisory
Issued:
2019-07-16
Updated:
2019-07-16

RHSA-2019:1789 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: 389-ds-base security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for 389-ds-base is now available for Red Hat Enterprise Linux 7.5 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.

Security Fix(es):

  • 389-ds-base: Insufficient fix for CVE-2018-14648 Denial of Service in RHEL-7.5 (CVE-2019-10171)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, the 389 server service will be restarted automatically.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.5 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.5 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.5 ppc64
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.5 ppc64le
  • Red Hat Enterprise Linux EUS Compute Node 7.5 x86_64

Fixes

  • BZ - 1722081 - CVE-2019-10171 389-ds-base: Insufficient fix for CVE-2018-14648 denial of service in RHEL-7.5

CVEs

  • CVE-2019-10171

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.5

SRPM
389-ds-base-1.3.7.5-30.el7_5.src.rpm SHA-256: c8b0228a0c0b11a8031616da36a3ea9b8a788db456dd6eb11fa7449418d8c8df
x86_64
389-ds-base-1.3.7.5-30.el7_5.x86_64.rpm SHA-256: 5be842da61927b259f8d571c32cb4eb791c8849cadeb24a15dea0a482155b26b
389-ds-base-debuginfo-1.3.7.5-30.el7_5.x86_64.rpm SHA-256: b361887c8a8f6fd60d5414703eca04f5a91c7433bbe63f8266dc348c23fb4c0e
389-ds-base-debuginfo-1.3.7.5-30.el7_5.x86_64.rpm SHA-256: b361887c8a8f6fd60d5414703eca04f5a91c7433bbe63f8266dc348c23fb4c0e
389-ds-base-devel-1.3.7.5-30.el7_5.x86_64.rpm SHA-256: 5ec120422b1c1eeb208dd0ec18cf4e0d72375fa6031efc15ceada11e79cc743c
389-ds-base-libs-1.3.7.5-30.el7_5.x86_64.rpm SHA-256: f7d3d5922b8d127d5942cc079443a3ec1563d44b19cfb43a82e8feaef5f04403
389-ds-base-snmp-1.3.7.5-30.el7_5.x86_64.rpm SHA-256: e5271be7ddf258f3301b2ac98aac6495060a94bc92033fa9e62b77a3e273af3e

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.5

SRPM
389-ds-base-1.3.7.5-30.el7_5.src.rpm SHA-256: c8b0228a0c0b11a8031616da36a3ea9b8a788db456dd6eb11fa7449418d8c8df
s390x
389-ds-base-1.3.7.5-30.el7_5.s390x.rpm SHA-256: 6718b9937e6b3826a12597fa55a3477f3a03b45e4f6cf5890bf77376ed8a5cbb
389-ds-base-debuginfo-1.3.7.5-30.el7_5.s390x.rpm SHA-256: 96f46e16159591375b6a21b77ae0775f4e68f20761803e5b6bc1826ff1ac65e1
389-ds-base-devel-1.3.7.5-30.el7_5.s390x.rpm SHA-256: 8545085fcd9afd4daaaba563e3fe362050bcfaf973aaa23e8a4f8fab351dc474
389-ds-base-libs-1.3.7.5-30.el7_5.s390x.rpm SHA-256: 78d6b8cf2654b80e688f744ab0bf9fd858ea2eaf444c88a2035492b62c8f3c26
389-ds-base-snmp-1.3.7.5-30.el7_5.s390x.rpm SHA-256: d676e28b59cc7997b42f0f0f392ed935ba223c5ca9c61e7c781cb2b946cc0ff2

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.5

SRPM
389-ds-base-1.3.7.5-30.el7_5.src.rpm SHA-256: c8b0228a0c0b11a8031616da36a3ea9b8a788db456dd6eb11fa7449418d8c8df
ppc64
389-ds-base-1.3.7.5-30.el7_5.ppc64.rpm SHA-256: 960032f5e7d1160bf1a60b6db29d9b5210e011d964f0af48e47e128d0199f46f
389-ds-base-debuginfo-1.3.7.5-30.el7_5.ppc64.rpm SHA-256: ee8b2c7fa4a90665a64c6ca3401f605836fe416164ab410b42bd03c8366b4463
389-ds-base-devel-1.3.7.5-30.el7_5.ppc64.rpm SHA-256: a9f84fd45dc5ff1245c54a17742b58b0f87e07907326dd3a8b95b9f6382e7827
389-ds-base-libs-1.3.7.5-30.el7_5.ppc64.rpm SHA-256: 14a939d33c8f5030b45339bf66cb2ca7ce9acb217e0d2c0edcf82b0b685c006c
389-ds-base-snmp-1.3.7.5-30.el7_5.ppc64.rpm SHA-256: d14a6d10a0e166d6dc7e36b8e74d0198905dfc56aabe3d1c26a69506fcfb5775

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.5

SRPM
389-ds-base-1.3.7.5-30.el7_5.src.rpm SHA-256: c8b0228a0c0b11a8031616da36a3ea9b8a788db456dd6eb11fa7449418d8c8df
ppc64le
389-ds-base-1.3.7.5-30.el7_5.ppc64le.rpm SHA-256: 9606d5db5fc5cbd24a99f2646fb7c11295b853cffe56133c20acdfda7b4d7ec0
389-ds-base-debuginfo-1.3.7.5-30.el7_5.ppc64le.rpm SHA-256: db44a592f0b132ed79406db035709f231961adbd842bbd05f7ce2e7bb0a4cb2d
389-ds-base-debuginfo-1.3.7.5-30.el7_5.ppc64le.rpm SHA-256: db44a592f0b132ed79406db035709f231961adbd842bbd05f7ce2e7bb0a4cb2d
389-ds-base-devel-1.3.7.5-30.el7_5.ppc64le.rpm SHA-256: 86758003f8fb629aae307c9680b192021c6f129e68c46ff7a50f4dbb3036f9a5
389-ds-base-libs-1.3.7.5-30.el7_5.ppc64le.rpm SHA-256: 802e718272818825718b1e8f73a85ca1b9dd5b06e00744b026004241fbdb14a2
389-ds-base-snmp-1.3.7.5-30.el7_5.ppc64le.rpm SHA-256: 1f41c0b87165af9aee52c6be20ed401e60aa6bcd08ca70a8347a2cd47fce32ca

Red Hat Enterprise Linux EUS Compute Node 7.5

SRPM
389-ds-base-1.3.7.5-30.el7_5.src.rpm SHA-256: c8b0228a0c0b11a8031616da36a3ea9b8a788db456dd6eb11fa7449418d8c8df
x86_64
389-ds-base-1.3.7.5-30.el7_5.x86_64.rpm SHA-256: 5be842da61927b259f8d571c32cb4eb791c8849cadeb24a15dea0a482155b26b
389-ds-base-debuginfo-1.3.7.5-30.el7_5.x86_64.rpm SHA-256: b361887c8a8f6fd60d5414703eca04f5a91c7433bbe63f8266dc348c23fb4c0e
389-ds-base-devel-1.3.7.5-30.el7_5.x86_64.rpm SHA-256: 5ec120422b1c1eeb208dd0ec18cf4e0d72375fa6031efc15ceada11e79cc743c
389-ds-base-libs-1.3.7.5-30.el7_5.x86_64.rpm SHA-256: f7d3d5922b8d127d5942cc079443a3ec1563d44b19cfb43a82e8feaef5f04403
389-ds-base-snmp-1.3.7.5-30.el7_5.x86_64.rpm SHA-256: e5271be7ddf258f3301b2ac98aac6495060a94bc92033fa9e62b77a3e273af3e

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility