ID CVE-2017-2668
Summary 389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service.
References
Vulnerable Configurations
  • Fedora Project 389 Directory Server 1.3.5.2
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.2
  • Fedora Project 389 Directory Server 1.3.5.3
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.3
  • Fedora Project 389 Directory Server 1.3.5.4
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.4
  • Fedora Project 389 Directory Server 1.3.5.13
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.13
  • Fedora Project 389 Directory Server 1.3.5.14
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.14
  • Fedora Project 389 Directory Server 1.3.5.15
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.15
  • Fedora Project 389 Directory Server 1.3.5.16
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.16
  • Fedora Project 389 Directory Server 1.3.6.0
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.0
  • Fedora Project 389 Directory Server 1.3.6.1
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.1
  • Fedora Project 389 Directory Server 1.3.6.2
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.2
  • Fedora Project 389 Directory Server 1.3.6.3
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.3
  • Fedora Project 389 Directory Server 1.3.6.4
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.4
  • Fedora Project 389 Directory Server 1.3.6.5
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.5
  • Fedora Project 389 Directory Server 1.3.6.6
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.6
  • Fedora Project 389 Directory Server 1.3.6.7
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.7
  • Fedora Project 389 Directory Server 1.3.6.8
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.8
  • Fedora Project 389 Directory Server 1.3.6.9
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.9
  • Red Hat Enterprise Linux Desktop 6.0
    cpe:2.3:o:redhat:enterprise_linux_desktop:6.0
  • RedHat Enterprise Linux Desktop 7.0
    cpe:2.3:o:redhat:enterprise_linux_desktop:7.0
  • Red Hat Enterprise Linux Server 6.0
    cpe:2.3:o:redhat:enterprise_linux_server:6.0
  • RedHat Enterprise Linux Server 7.0
    cpe:2.3:o:redhat:enterprise_linux_server:7.0
  • Red Hat Enterprise Linux Workstation 6.0
    cpe:2.3:o:redhat:enterprise_linux_workstation:6.0
  • RedHat Enterprise Linux Workstation 7.0
    cpe:2.3:o:redhat:enterprise_linux_workstation:7.0
CVSS
Base: 4.3
Impact:
Exploitability:
CWE CWE-476
CAPEC
nessus via4
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2017-0920.NASL
    description An update for 389-ds-base is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es) : * An invalid pointer dereference flaw was found in the way 389-ds-base handled LDAP bind requests. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service. (CVE-2017-2668) Red Hat would like to thank Joachim Jabs (F24) for reporting this issue. Bug Fix(es) : * Previously, when adding a filtered role definition that uses the 'nsrole' virtual attribute in the filter, Directory Server terminated unexpectedly. A patch has been applied, and now the roles plug-in ignores all virtual attributes. As a result, an error message is logged when an invalid filter is used. Additionally, the role is deactivated and Directory Server no longer fails. (BZ#1429498) * In a replication topology, Directory Server incorrectly calculated the size of string format entries when a lot of entries were deleted. The calculated size of entries was smaller than the actual required size. Consequently, Directory Server allocated insufficient memory and terminated unexpectedly when the data was written to it. With this update, the size of string format entries is now calculated correctly in the described situation and Directory Server no longer terminates unexpectedly. (BZ#1429495)
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 99382
    published 2017-04-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99382
    title CentOS 7 : 389-ds-base (CESA-2017:0920)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20170412_389_DS_BASE_ON_SL7_X.NASL
    description Security Fix(es) : - An invalid pointer dereference flaw was found in the way 389-ds-base handled LDAP bind requests. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service. (CVE-2017-2668) Bug Fix(es) : - Previously, when adding a filtered role definition that uses the 'nsrole' virtual attribute in the filter, Directory Server terminated unexpectedly. A patch has been applied, and now the roles plug-in ignores all virtual attributes. As a result, an error message is logged when an invalid filter is used. Additionally, the role is deactivated and Directory Server no longer fails. - In a replication topology, Directory Server incorrectly calculated the size of string format entries when a lot of entries were deleted. The calculated size of entries was smaller than the actual required size. Consequently, Directory Server allocated insufficient memory and terminated unexpectedly when the data was written to it. With this update, the size of string format entries is now calculated correctly in the described situation and Directory Server no longer terminates unexpectedly.
    last seen 2019-02-21
    modified 2018-12-27
    plugin id 99349
    published 2017-04-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99349
    title Scientific Linux Security Update : 389-ds-base on SL7.x x86_64
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2017-0893.NASL
    description From Red Hat Security Advisory 2017:0893 : An update for 389-ds-base is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es) : * An invalid pointer dereference flaw was found in the way 389-ds-base handled LDAP bind requests. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service. (CVE-2017-2668) Red Hat would like to thank Joachim Jabs (F24) for reporting this issue. Bug Fix(es) : * Previously, the 'deref' plug-in failed to dereference attributes that use distinguished name (DN) syntax, such as 'uniqueMember'. With this patch, the 'deref' plug-in can dereference such attributes and additionally 'Name and Optional UID' syntax. As a result, the 'deref' plug-in now supports any syntax. (BZ#1435365)
    last seen 2019-02-21
    modified 2018-09-05
    plugin id 99299
    published 2017-04-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99299
    title Oracle Linux 6 : 389-ds-base (ELSA-2017-0893)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2017-0920.NASL
    description An update for 389-ds-base is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es) : * An invalid pointer dereference flaw was found in the way 389-ds-base handled LDAP bind requests. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service. (CVE-2017-2668) Red Hat would like to thank Joachim Jabs (F24) for reporting this issue. Bug Fix(es) : * Previously, when adding a filtered role definition that uses the 'nsrole' virtual attribute in the filter, Directory Server terminated unexpectedly. A patch has been applied, and now the roles plug-in ignores all virtual attributes. As a result, an error message is logged when an invalid filter is used. Additionally, the role is deactivated and Directory Server no longer fails. (BZ#1429498) * In a replication topology, Directory Server incorrectly calculated the size of string format entries when a lot of entries were deleted. The calculated size of entries was smaller than the actual required size. Consequently, Directory Server allocated insufficient memory and terminated unexpectedly when the data was written to it. With this update, the size of string format entries is now calculated correctly in the described situation and Directory Server no longer terminates unexpectedly. (BZ#1429495)
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 99343
    published 2017-04-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99343
    title RHEL 7 : 389-ds-base (RHSA-2017:0920)
  • NASL family Huawei Local Security Checks
    NASL id EULEROS_SA-2017-1087.NASL
    description According to the version of the 389-ds-base packages installed, the EulerOS installation on the remote host is affected by the following vulnerability : - An invalid pointer dereference flaw was found in the way 389-ds-base handled LDAP bind requests. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service. (CVE-2017-2668) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-14
    plugin id 99953
    published 2017-05-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99953
    title EulerOS 2.0 SP2 : 389-ds-base (EulerOS-SA-2017-1087)
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2017-824.NASL
    description Remote crash via crafted LDAP messages : An invalid pointer dereference flaw was found in the way 389-ds-base handled LDAP bind requests. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service. (CVE-2017-2668)
    last seen 2019-02-21
    modified 2018-08-31
    plugin id 99712
    published 2017-04-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99712
    title Amazon Linux AMI : 389-ds-base (ALAS-2017-824)
  • NASL family Virtuozzo Local Security Checks
    NASL id VIRTUOZZO_VZLSA-2017-0893.NASL
    description An update for 389-ds-base is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es) : * An invalid pointer dereference flaw was found in the way 389-ds-base handled LDAP bind requests. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service. (CVE-2017-2668) Red Hat would like to thank Joachim Jabs (F24) for reporting this issue. Bug Fix(es) : * Previously, the 'deref' plug-in failed to dereference attributes that use distinguished name (DN) syntax, such as 'uniqueMember'. With this patch, the 'deref' plug-in can dereference such attributes and additionally 'Name and Optional UID' syntax. As a result, the 'deref' plug-in now supports any syntax. (BZ#1435365) Note that Tenable Network Security has attempted to extract the preceding description block directly from the corresponding Red Hat security advisory. Virtuozzo provides no description for VZLSA advisories. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-20
    plugin id 101444
    published 2017-07-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=101444
    title Virtuozzo 6 : 389-ds-base / 389-ds-base-devel / 389-ds-base-libs (VZLSA-2017-0893)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2017-1396.NASL
    description This update for 389-ds fixes the following issues : - CVE-2017-7551: 389-ds-base: Password brute-force possible for locked account due to different return codes (bsc#1051997) - CVE-2016-4992: 389-ds: Information disclosure via repeated use of LDAP ADD operation (bsc#997256) - CVE-2016-5405: 389-ds: Password verification vulnerable to timing attack (bsc#1007004) - CVE-2017-2591: 389-ds-base: Heap buffer overflow in uiduniq.c (bsc#1020670) - CVE-2017-2668 389-ds Remote crash via crafted LDAP messages (bsc#1069067) - CVE-2016-0741: 389-ds: worker threads do not detect abnormally closed connections causing DoS (bsc#1069074)
    last seen 2019-02-21
    modified 2018-01-26
    plugin id 105366
    published 2017-12-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=105366
    title openSUSE Security Update : 389-ds (openSUSE-2017-1396)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20170411_389_DS_BASE_ON_SL6_X.NASL
    description Security Fix(es) : - An invalid pointer dereference flaw was found in the way 389-ds-base handled LDAP bind requests. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service. (CVE-2017-2668) Bug Fix(es) : - Previously, the 'deref' plug-in failed to dereference attributes that use distinguished name (DN) syntax, such as 'uniqueMember'. With this patch, the 'deref' plug-in can dereference such attributes and additionally 'Name and Optional UID' syntax. As a result, the 'deref' plug-in now supports any syntax.
    last seen 2019-02-21
    modified 2018-12-27
    plugin id 99300
    published 2017-04-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99300
    title Scientific Linux Security Update : 389-ds-base on SL6.x i386/x86_64
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2017-0893.NASL
    description An update for 389-ds-base is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es) : * An invalid pointer dereference flaw was found in the way 389-ds-base handled LDAP bind requests. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service. (CVE-2017-2668) Red Hat would like to thank Joachim Jabs (F24) for reporting this issue. Bug Fix(es) : * Previously, the 'deref' plug-in failed to dereference attributes that use distinguished name (DN) syntax, such as 'uniqueMember'. With this patch, the 'deref' plug-in can dereference such attributes and additionally 'Name and Optional UID' syntax. As a result, the 'deref' plug-in now supports any syntax. (BZ#1435365)
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 99317
    published 2017-04-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99317
    title CentOS 6 : 389-ds-base (CESA-2017:0893)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2017-0893.NASL
    description An update for 389-ds-base is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es) : * An invalid pointer dereference flaw was found in the way 389-ds-base handled LDAP bind requests. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service. (CVE-2017-2668) Red Hat would like to thank Joachim Jabs (F24) for reporting this issue. Bug Fix(es) : * Previously, the 'deref' plug-in failed to dereference attributes that use distinguished name (DN) syntax, such as 'uniqueMember'. With this patch, the 'deref' plug-in can dereference such attributes and additionally 'Name and Optional UID' syntax. As a result, the 'deref' plug-in now supports any syntax. (BZ#1435365)
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 99339
    published 2017-04-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99339
    title RHEL 6 : 389-ds-base (RHSA-2017:0893)
  • NASL family Virtuozzo Local Security Checks
    NASL id VIRTUOZZO_VZLSA-2017-0920.NASL
    description An update for 389-ds-base is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es) : * An invalid pointer dereference flaw was found in the way 389-ds-base handled LDAP bind requests. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service. (CVE-2017-2668) Red Hat would like to thank Joachim Jabs (F24) for reporting this issue. Bug Fix(es) : * Previously, when adding a filtered role definition that uses the 'nsrole' virtual attribute in the filter, Directory Server terminated unexpectedly. A patch has been applied, and now the roles plug-in ignores all virtual attributes. As a result, an error message is logged when an invalid filter is used. Additionally, the role is deactivated and Directory Server no longer fails. (BZ#1429498) * In a replication topology, Directory Server incorrectly calculated the size of string format entries when a lot of entries were deleted. The calculated size of entries was smaller than the actual required size. Consequently, Directory Server allocated insufficient memory and terminated unexpectedly when the data was written to it. With this update, the size of string format entries is now calculated correctly in the described situation and Directory Server no longer terminates unexpectedly. (BZ#1429495) Note that Tenable Network Security has attempted to extract the preceding description block directly from the corresponding Red Hat security advisory. Virtuozzo provides no description for VZLSA advisories. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-20
    plugin id 101448
    published 2017-07-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=101448
    title Virtuozzo 7 : 389-ds-base / 389-ds-base-devel / 389-ds-base-libs / etc (VZLSA-2017-0920)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2017-0920.NASL
    description From Red Hat Security Advisory 2017:0920 : An update for 389-ds-base is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es) : * An invalid pointer dereference flaw was found in the way 389-ds-base handled LDAP bind requests. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service. (CVE-2017-2668) Red Hat would like to thank Joachim Jabs (F24) for reporting this issue. Bug Fix(es) : * Previously, when adding a filtered role definition that uses the 'nsrole' virtual attribute in the filter, Directory Server terminated unexpectedly. A patch has been applied, and now the roles plug-in ignores all virtual attributes. As a result, an error message is logged when an invalid filter is used. Additionally, the role is deactivated and Directory Server no longer fails. (BZ#1429498) * In a replication topology, Directory Server incorrectly calculated the size of string format entries when a lot of entries were deleted. The calculated size of entries was smaller than the actual required size. Consequently, Directory Server allocated insufficient memory and terminated unexpectedly when the data was written to it. With this update, the size of string format entries is now calculated correctly in the described situation and Directory Server no longer terminates unexpectedly. (BZ#1429495)
    last seen 2019-02-21
    modified 2018-09-05
    plugin id 99332
    published 2017-04-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99332
    title Oracle Linux 7 : 389-ds-base (ELSA-2017-0920)
redhat via4
advisories
  • bugzilla
    id 1436575
    title CVE-2017-2668 389-ds-base: Remote crash via crafted LDAP messages
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhsa:tst:20100842001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhsa:tst:20100842002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhsa:tst:20100842003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhsa:tst:20100842004
    • OR
      • AND
        • comment 389-ds-base is earlier than 0:1.2.11.15-91.el6_9
          oval oval:com.redhat.rhsa:tst:20170893009
        • comment 389-ds-base is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20120813006
      • AND
        • comment 389-ds-base-devel is earlier than 0:1.2.11.15-91.el6_9
          oval oval:com.redhat.rhsa:tst:20170893005
        • comment 389-ds-base-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20120813008
      • AND
        • comment 389-ds-base-libs is earlier than 0:1.2.11.15-91.el6_9
          oval oval:com.redhat.rhsa:tst:20170893007
        • comment 389-ds-base-libs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20120813010
    rhsa
    id RHSA-2017:0893
    released 2017-04-11
    severity Important
    title RHSA-2017:0893: 389-ds-base security and bug fix update (Important)
  • bugzilla
    id 1436575
    title CVE-2017-2668 389-ds-base: Remote crash via crafted LDAP messages
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 7 Client is installed
        oval oval:com.redhat.rhsa:tst:20140675001
      • comment Red Hat Enterprise Linux 7 Server is installed
        oval oval:com.redhat.rhsa:tst:20140675002
      • comment Red Hat Enterprise Linux 7 Workstation is installed
        oval oval:com.redhat.rhsa:tst:20140675003
      • comment Red Hat Enterprise Linux 7 ComputeNode is installed
        oval oval:com.redhat.rhsa:tst:20140675004
    • OR
      • AND
        • comment 389-ds-base is earlier than 0:1.3.5.10-20.el7_3
          oval oval:com.redhat.rhsa:tst:20170920009
        • comment 389-ds-base is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20120813006
      • AND
        • comment 389-ds-base-devel is earlier than 0:1.3.5.10-20.el7_3
          oval oval:com.redhat.rhsa:tst:20170920011
        • comment 389-ds-base-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20120813008
      • AND
        • comment 389-ds-base-libs is earlier than 0:1.3.5.10-20.el7_3
          oval oval:com.redhat.rhsa:tst:20170920005
        • comment 389-ds-base-libs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20120813010
      • AND
        • comment 389-ds-base-snmp is earlier than 0:1.3.5.10-20.el7_3
          oval oval:com.redhat.rhsa:tst:20170920007
        • comment 389-ds-base-snmp is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20162594010
    rhsa
    id RHSA-2017:0920
    released 2017-04-12
    severity Important
    title RHSA-2017:0920: 389-ds-base security and bug fix update (Important)
rpms
  • 389-ds-base-0:1.2.11.15-91.el6_9
  • 389-ds-base-devel-0:1.2.11.15-91.el6_9
  • 389-ds-base-libs-0:1.2.11.15-91.el6_9
  • 389-ds-base-0:1.3.5.10-20.el7_3
  • 389-ds-base-devel-0:1.3.5.10-20.el7_3
  • 389-ds-base-libs-0:1.3.5.10-20.el7_3
  • 389-ds-base-snmp-0:1.3.5.10-20.el7_3
refmap via4
bid 97524
confirm
Last major update 22-06-2018 - 09:29
Published 22-06-2018 - 09:29
Last modified 23-08-2018 - 10:11
Back to Top