- Issued:
- 2022-12-07
- Updated:
- 2022-12-07
RHSA-2022:8886 - Security Advisory
Synopsis
Moderate: redhat-ds:11 security, bug fix, and enhancement update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for the redhat-ds:11 module is now available for Red Hat Directory Server 11.5 for RHEL 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Red Hat Directory Server is an LDAPv3-compliant directory server. The suite of packages includes the Lightweight Directory Access Protocol (LDAP) server, as well as command-line utilities and Web UI packages for server administration.
Security Fix(es):
- 389-ds-base: SIGSEGV in sync_repl (CVE-2022-2850)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- broken nsslapd-subtree-rename-switch option in rhds11 (BZ#2098140)
Solution
For details on how to apply this update, which includes the changes described in
this advisory, refer to:
https://access.redhat.com/articles/11258
Affected Products
- Red Hat Directory Server 11 x86_64
Fixes
- BZ - 2098140 - broken nsslapd-subtree-rename-switch option in rhds11
- BZ - 2118691 - CVE-2022-2850 389-ds-base: SIGSEGV in sync_repl
CVEs
Red Hat Directory Server 11
SRPM | |
---|---|
389-ds-base-1.4.3.29-7.module+el8dsrv+17334+74991258.src.rpm | SHA-256: a841c9bd2309f1212c31488587cc5a4d9e9b160a99fa8af96a21c14f554d651f |
x86_64 | |
389-ds-base-1.4.3.29-7.module+el8dsrv+17334+74991258.x86_64.rpm | SHA-256: 41dd4b00f151316380d16570e36b46478ccc04223b03720c2f4274e9580af960 |
389-ds-base-debuginfo-1.4.3.29-7.module+el8dsrv+17334+74991258.x86_64.rpm | SHA-256: 036dc36f65900ab0a09f999c23fe231d0e1e3e11001244b3ec8ad2d0d364c46e |
389-ds-base-debugsource-1.4.3.29-7.module+el8dsrv+17334+74991258.x86_64.rpm | SHA-256: 634bc73e6bb5c9aa742bafbe48f0a8b130722d947e40fd2f774356ae19f23291 |
389-ds-base-devel-1.4.3.29-7.module+el8dsrv+17334+74991258.x86_64.rpm | SHA-256: 2d2243c27d106fce6ce1a26894e89e33d6854ba25554901745f85fb31398da9f |
389-ds-base-legacy-tools-1.4.3.29-7.module+el8dsrv+17334+74991258.x86_64.rpm | SHA-256: 8d25cdff78dc11d5e491e6308f3ab886cb7f9f03a5449410bc49f70c3f70c3ae |
389-ds-base-legacy-tools-debuginfo-1.4.3.29-7.module+el8dsrv+17334+74991258.x86_64.rpm | SHA-256: 410031daa2c0e20705c33903255476f65ad47919c830f2e80d0c5a8336edcbd6 |
389-ds-base-libs-1.4.3.29-7.module+el8dsrv+17334+74991258.x86_64.rpm | SHA-256: da8f2b12e3bb662d28f5de12654315116a0178ab47aa6ca74ece00377e9db767 |
389-ds-base-libs-debuginfo-1.4.3.29-7.module+el8dsrv+17334+74991258.x86_64.rpm | SHA-256: ddefb6d8e858c0221e8c20f792c0699980ebba6b87e6011742cf381bf3ebfd30 |
389-ds-base-snmp-1.4.3.29-7.module+el8dsrv+17334+74991258.x86_64.rpm | SHA-256: a1d8f9d81e0d0919439ac58f6b3e81ccd639f7f36e891b9f0ad4a5467cab8bad |
389-ds-base-snmp-debuginfo-1.4.3.29-7.module+el8dsrv+17334+74991258.x86_64.rpm | SHA-256: e4f1f8f66d9b8616448c1d57693a54ad11c763ab9ba642fa678b600bc107bc9b |
cockpit-389-ds-1.4.3.29-7.module+el8dsrv+17334+74991258.noarch.rpm | SHA-256: 720ace302f8eba4629ae93aca833e93d180f51d3dc868297b342c39be2edf795 |
python3-lib389-1.4.3.29-7.module+el8dsrv+17334+74991258.noarch.rpm | SHA-256: 3c0bb762b68abfe83a0c811b61a92e10050c4bf140ad360e0fa7b208f8c2634a |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.