Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2007-5794 (GCVE-0-2007-5794)
Vulnerability from cvelistv5
Published
2007-11-13 23:00
Modified
2024-08-07 15:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:46:59.521Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "28061",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28061"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=453868"
},
{
"name": "27670",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27670"
},
{
"name": "[Dovecot] 20050303 hanging imap... and users getting other users\u0027 emails!",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.dovecot.org/list/dovecot/2005-March/006345.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=154314"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://bugs.gentoo.org/show_bug.cgi?id=198390"
},
{
"name": "29083",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29083"
},
{
"name": "GLSA-200711-33",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200711-33.xml"
},
{
"name": "[Dovecot] 20050409 Authentication and the wrong mailbox?",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.dovecot.org/list/dovecot/2005-April/006859.html"
},
{
"name": "20080212 FLEA-2008-0003-1 nss_ldap",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/487985/100/0/threaded"
},
{
"name": "oval:org.mitre.oval:def:10625",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10625"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.rpath.com/browse/RPL-1913"
},
{
"name": "27768",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27768"
},
{
"name": "26452",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/26452"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=367461"
},
{
"name": "27839",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27839"
},
{
"name": "RHSA-2008:0389",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0389.html"
},
{
"name": "MDVSA-2008:049",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:049"
},
{
"name": "30352",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30352"
},
{
"name": "31227",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31227"
},
{
"name": "DSA-1430",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2007/dsa-1430"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-332.htm"
},
{
"name": "31524",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31524"
},
{
"name": "1020088",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020088"
},
{
"name": "RHSA-2008:0715",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0715.html"
},
{
"name": "28838",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28838"
},
{
"name": "SUSE-SR:2008:003",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
},
{
"name": "nssldap-ldap-race-condition(38505)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38505"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0255"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-11-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-15T20:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "28061",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28061"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=453868"
},
{
"name": "27670",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27670"
},
{
"name": "[Dovecot] 20050303 hanging imap... and users getting other users\u0027 emails!",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.dovecot.org/list/dovecot/2005-March/006345.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=154314"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://bugs.gentoo.org/show_bug.cgi?id=198390"
},
{
"name": "29083",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29083"
},
{
"name": "GLSA-200711-33",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200711-33.xml"
},
{
"name": "[Dovecot] 20050409 Authentication and the wrong mailbox?",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.dovecot.org/list/dovecot/2005-April/006859.html"
},
{
"name": "20080212 FLEA-2008-0003-1 nss_ldap",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/487985/100/0/threaded"
},
{
"name": "oval:org.mitre.oval:def:10625",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10625"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.rpath.com/browse/RPL-1913"
},
{
"name": "27768",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27768"
},
{
"name": "26452",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/26452"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=367461"
},
{
"name": "27839",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27839"
},
{
"name": "RHSA-2008:0389",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0389.html"
},
{
"name": "MDVSA-2008:049",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:049"
},
{
"name": "30352",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30352"
},
{
"name": "31227",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31227"
},
{
"name": "DSA-1430",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2007/dsa-1430"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-332.htm"
},
{
"name": "31524",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31524"
},
{
"name": "1020088",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020088"
},
{
"name": "RHSA-2008:0715",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0715.html"
},
{
"name": "28838",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28838"
},
{
"name": "SUSE-SR:2008:003",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
},
{
"name": "nssldap-ldap-race-condition(38505)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38505"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0255"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2007-5794",
"datePublished": "2007-11-13T23:00:00",
"dateReserved": "2007-11-02T00:00:00",
"dateUpdated": "2024-08-07T15:46:59.521Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2007-5794\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2007-11-13T23:46:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.\"},{\"lang\":\"es\",\"value\":\"Una condici\u00f3n de carrera en nss_ldap, cuando es usado en aplicaciones que est\u00e1n enlazadas contra la biblioteca y bifurcaci\u00f3n de pthread despu\u00e9s de una llamada a nss_ldap, puede enviar datos de usuario al proceso incorrecto debido al manejo inapropiado de la conexi\u00f3n LDAP. NOTA: este problema fue reportado originalmente por Dovecot con los buzones equivocados siendo devueltos, pero otras aplicaciones tambi\u00e9n podr\u00edan estar afectadas.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nss_ldap:nss_ldap:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A6B086B-F03D-4B3B-BE8C-60CDAB1955C2\"}]}]}],\"references\":[{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=453868\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://bugs.gentoo.org/show_bug.cgi?id=198390\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/27670\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27768\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27839\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28061\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28838\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29083\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30352\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31227\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31524\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200711-33.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-332.htm\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0255\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2007/dsa-1430\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.dovecot.org/list/dovecot/2005-April/006859.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.dovecot.org/list/dovecot/2005-March/006345.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:049\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0389.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0715.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/487985/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/26452\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securitytracker.com/id?1020088\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=154314\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=367461\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/38505\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1913\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10625\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=453868\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://bugs.gentoo.org/show_bug.cgi?id=198390\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/27670\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27768\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27839\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28061\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28838\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29083\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30352\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31227\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31524\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200711-33.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-332.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0255\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2007/dsa-1430\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.dovecot.org/list/dovecot/2005-April/006859.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.dovecot.org/list/dovecot/2005-March/006345.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:049\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0389.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0715.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/487985/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/26452\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securitytracker.com/id?1020088\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=154314\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=367461\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/38505\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1913\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10625\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
ghsa-8frr-8v9h-5c7m
Vulnerability from github
Published
2022-05-01 18:36
Modified
2022-05-01 18:36
VLAI Severity ?
Details
Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
{
"affected": [],
"aliases": [
"CVE-2007-5794"
],
"database_specific": {
"cwe_ids": [
"CWE-362"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2007-11-13T23:46:00Z",
"severity": "MODERATE"
},
"details": "Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.",
"id": "GHSA-8frr-8v9h-5c7m",
"modified": "2022-05-01T18:36:44Z",
"published": "2022-05-01T18:36:44Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5794"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=154314"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=367461"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38505"
},
{
"type": "WEB",
"url": "https://issues.rpath.com/browse/RPL-1913"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10625"
},
{
"type": "WEB",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=453868"
},
{
"type": "WEB",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=198390"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27670"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27768"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27839"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28061"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28838"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/29083"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30352"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31227"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31524"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200711-33.xml"
},
{
"type": "WEB",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-332.htm"
},
{
"type": "WEB",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0255"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2007/dsa-1430"
},
{
"type": "WEB",
"url": "http://www.dovecot.org/list/dovecot/2005-April/006859.html"
},
{
"type": "WEB",
"url": "http://www.dovecot.org/list/dovecot/2005-March/006345.html"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:049"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0389.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0715.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/487985/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/26452"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1020088"
}
],
"schema_version": "1.4.0",
"severity": []
}
rhsa-2008_0389
Vulnerability from csaf_redhat
Published
2008-05-20 14:16
Modified
2024-11-22 01:46
Summary
Red Hat Security Advisory: nss_ldap security and bug fix update
Notes
Topic
An updated nss_ldap package that fixes a security issue and several bugs is
now available.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
Details
The nss_ldap package contains the nss_ldap and pam_ldap modules. The
nss_ldap module is a plug-in which allows applications to retrieve
information about users and groups from a directory server. The pam_ldap
module allows PAM-aware applications to use a directory server to verify
user passwords.
A race condition was discovered in nss_ldap which affected certain
applications which make LDAP connections, such as Dovecot. This could cause
nss_ldap to answer a request for information about one user with
information about a different user. (CVE-2007-5794)
In addition, these updated packages fix the following bugs:
* a build error prevented the nss_ldap module from being able to use DNS to
discover the location of a directory server. For example, when the
/etc/nsswitch.conf configuration file was configured to use "ldap", but no
"host" or "uri" option was configured in the /etc/ldap.conf configuration
file, no directory server was contacted, and no results were returned.
* the "port" option in the /etc/ldap.conf configuration file on client
machines was ignored. For example, if a directory server which you were
attempting to use was listening on a non-default port (i.e. not ports 389
or 636), it was only possible to use that directory server by including the
port number in the "uri" option. In this updated package, the "port" option
works as expected.
* pam_ldap failed to change an expired password if it had to follow a
referral to do so, which could occur, for example, when using a slave
directory server in a replicated environment. An error such as the
following occurred after entering a new password: "LDAP password
information update failed: Can't contact LDAP server Insufficient 'write'
privilege to the 'userPassword' attribute"
This has been resolved in this updated package.
* when the "pam_password exop_send_old" password-change method was
configured in the /etc/ldap.conf configuration file, a logic error in the
pam_ldap module caused client machines to attempt to change a user's
password twice. First, the pam_ldap module attempted to change the password
using the "exop" request, and then again using an LDAP modify request.
* on Red Hat Enterprise Linux 5.1, rebuilding nss_ldap-253-5.el5 when the
krb5-*-1.6.1-17.el5 packages were installed failed due to an error such as
the following:
+ /builddir/build/SOURCES/dlopen.sh ./nss_ldap-253/nss_ldap.so
dlopen() of "././nss_ldap-253/nss_ldap.so" failed:
./././nss_ldap-253/nss_ldap.so: undefined symbol: request_key
error: Bad exit status from /var/tmp/rpm-tmp.62652 (%build)
The missing libraries have been added, which resolves this issue.
When recursively enumerating the set of members in a given group, the
module would allocate insufficient space for storing the set of member
names if the group itself contained other groups, thus corrupting the heap.
This update includes a backported fix for this bug.
Users of nss_ldap should upgrade to these updated packages, which contain
backported patches to correct this issue and fix these bugs.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated nss_ldap package that fixes a security issue and several bugs is\nnow available.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The nss_ldap package contains the nss_ldap and pam_ldap modules. The\nnss_ldap module is a plug-in which allows applications to retrieve\ninformation about users and groups from a directory server. The pam_ldap\nmodule allows PAM-aware applications to use a directory server to verify\nuser passwords.\n\nA race condition was discovered in nss_ldap which affected certain\napplications which make LDAP connections, such as Dovecot. This could cause\nnss_ldap to answer a request for information about one user with\ninformation about a different user. (CVE-2007-5794)\n\nIn addition, these updated packages fix the following bugs:\n\n* a build error prevented the nss_ldap module from being able to use DNS to\ndiscover the location of a directory server. For example, when the\n/etc/nsswitch.conf configuration file was configured to use \"ldap\", but no\n\"host\" or \"uri\" option was configured in the /etc/ldap.conf configuration\nfile, no directory server was contacted, and no results were returned.\n\n* the \"port\" option in the /etc/ldap.conf configuration file on client\nmachines was ignored. For example, if a directory server which you were\nattempting to use was listening on a non-default port (i.e. not ports 389\nor 636), it was only possible to use that directory server by including the\nport number in the \"uri\" option. In this updated package, the \"port\" option\nworks as expected.\n\n* pam_ldap failed to change an expired password if it had to follow a\nreferral to do so, which could occur, for example, when using a slave\ndirectory server in a replicated environment. An error such as the\nfollowing occurred after entering a new password: \"LDAP password\ninformation update failed: Can\u0027t contact LDAP server Insufficient \u0027write\u0027\nprivilege to the \u0027userPassword\u0027 attribute\"\n\nThis has been resolved in this updated package.\n\n* when the \"pam_password exop_send_old\" password-change method was\nconfigured in the /etc/ldap.conf configuration file, a logic error in the\npam_ldap module caused client machines to attempt to change a user\u0027s\npassword twice. First, the pam_ldap module attempted to change the password\nusing the \"exop\" request, and then again using an LDAP modify request.\n\n* on Red Hat Enterprise Linux 5.1, rebuilding nss_ldap-253-5.el5 when the\nkrb5-*-1.6.1-17.el5 packages were installed failed due to an error such as\nthe following:\n\n\t+ /builddir/build/SOURCES/dlopen.sh ./nss_ldap-253/nss_ldap.so\n\tdlopen() of \"././nss_ldap-253/nss_ldap.so\" failed:\n\t./././nss_ldap-253/nss_ldap.so: undefined symbol: request_key\n\terror: Bad exit status from /var/tmp/rpm-tmp.62652 (%build)\n\nThe missing libraries have been added, which resolves this issue.\n\nWhen recursively enumerating the set of members in a given group, the\nmodule would allocate insufficient space for storing the set of member\nnames if the group itself contained other groups, thus corrupting the heap.\nThis update includes a backported fix for this bug.\n\nUsers of nss_ldap should upgrade to these updated packages, which contain\nbackported patches to correct this issue and fix these bugs.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0389",
"url": "https://access.redhat.com/errata/RHSA-2008:0389"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "254172",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=254172"
},
{
"category": "external",
"summary": "364501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=364501"
},
{
"category": "external",
"summary": "367461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=367461"
},
{
"category": "external",
"summary": "427370",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427370"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0389.json"
}
],
"title": "Red Hat Security Advisory: nss_ldap security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T01:46:48+00:00",
"generator": {
"date": "2024-11-22T01:46:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2008:0389",
"initial_release_date": "2008-05-20T14:16:00+00:00",
"revision_history": [
{
"date": "2008-05-20T14:16:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-05-21T10:15:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T01:46:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-12.el5.src",
"product": {
"name": "nss_ldap-0:253-12.el5.src",
"product_id": "nss_ldap-0:253-12.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-12.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-12.el5.x86_64",
"product": {
"name": "nss_ldap-0:253-12.el5.x86_64",
"product_id": "nss_ldap-0:253-12.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-12.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-12.el5.x86_64",
"product": {
"name": "nss_ldap-debuginfo-0:253-12.el5.x86_64",
"product_id": "nss_ldap-debuginfo-0:253-12.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-12.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-12.el5.i386",
"product": {
"name": "nss_ldap-0:253-12.el5.i386",
"product_id": "nss_ldap-0:253-12.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-12.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-12.el5.i386",
"product": {
"name": "nss_ldap-debuginfo-0:253-12.el5.i386",
"product_id": "nss_ldap-debuginfo-0:253-12.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-12.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-12.el5.ia64",
"product": {
"name": "nss_ldap-0:253-12.el5.ia64",
"product_id": "nss_ldap-0:253-12.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-12.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-12.el5.ia64",
"product": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ia64",
"product_id": "nss_ldap-debuginfo-0:253-12.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-12.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-12.el5.ppc64",
"product": {
"name": "nss_ldap-0:253-12.el5.ppc64",
"product_id": "nss_ldap-0:253-12.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-12.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-12.el5.ppc64",
"product": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ppc64",
"product_id": "nss_ldap-debuginfo-0:253-12.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-12.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-12.el5.ppc",
"product": {
"name": "nss_ldap-0:253-12.el5.ppc",
"product_id": "nss_ldap-0:253-12.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-12.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-12.el5.ppc",
"product": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ppc",
"product_id": "nss_ldap-debuginfo-0:253-12.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-12.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-12.el5.s390",
"product": {
"name": "nss_ldap-0:253-12.el5.s390",
"product_id": "nss_ldap-0:253-12.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-12.el5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-12.el5.s390",
"product": {
"name": "nss_ldap-debuginfo-0:253-12.el5.s390",
"product_id": "nss_ldap-debuginfo-0:253-12.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-12.el5?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-12.el5.s390x",
"product": {
"name": "nss_ldap-0:253-12.el5.s390x",
"product_id": "nss_ldap-0:253-12.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-12.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-12.el5.s390x",
"product": {
"name": "nss_ldap-debuginfo-0:253-12.el5.s390x",
"product_id": "nss_ldap-debuginfo-0:253-12.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-12.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-0:253-12.el5.i386"
},
"product_reference": "nss_ldap-0:253-12.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-0:253-12.el5.ia64"
},
"product_reference": "nss_ldap-0:253-12.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-0:253-12.el5.ppc"
},
"product_reference": "nss_ldap-0:253-12.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-0:253-12.el5.ppc64"
},
"product_reference": "nss_ldap-0:253-12.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-0:253-12.el5.s390"
},
"product_reference": "nss_ldap-0:253-12.el5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-0:253-12.el5.s390x"
},
"product_reference": "nss_ldap-0:253-12.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-0:253-12.el5.src"
},
"product_reference": "nss_ldap-0:253-12.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-0:253-12.el5.x86_64"
},
"product_reference": "nss_ldap-0:253-12.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-debuginfo-0:253-12.el5.i386"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-debuginfo-0:253-12.el5.ia64"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-debuginfo-0:253-12.el5.ppc"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-debuginfo-0:253-12.el5.ppc64"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-debuginfo-0:253-12.el5.s390"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-debuginfo-0:253-12.el5.s390x"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-debuginfo-0:253-12.el5.x86_64"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-0:253-12.el5.i386"
},
"product_reference": "nss_ldap-0:253-12.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-0:253-12.el5.ia64"
},
"product_reference": "nss_ldap-0:253-12.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-0:253-12.el5.ppc"
},
"product_reference": "nss_ldap-0:253-12.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-0:253-12.el5.ppc64"
},
"product_reference": "nss_ldap-0:253-12.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-0:253-12.el5.s390"
},
"product_reference": "nss_ldap-0:253-12.el5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-0:253-12.el5.s390x"
},
"product_reference": "nss_ldap-0:253-12.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-0:253-12.el5.src"
},
"product_reference": "nss_ldap-0:253-12.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-0:253-12.el5.x86_64"
},
"product_reference": "nss_ldap-0:253-12.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-debuginfo-0:253-12.el5.i386"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-debuginfo-0:253-12.el5.ia64"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-debuginfo-0:253-12.el5.ppc"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-debuginfo-0:253-12.el5.ppc64"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-debuginfo-0:253-12.el5.s390"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-debuginfo-0:253-12.el5.s390x"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-debuginfo-0:253-12.el5.x86_64"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5794",
"discovery_date": "2005-04-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "367461"
}
],
"notes": [
{
"category": "description",
"text": "Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss_ldap randomly replying with wrong user\u0027s data",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:nss_ldap-0:253-12.el5.i386",
"5Client:nss_ldap-0:253-12.el5.ia64",
"5Client:nss_ldap-0:253-12.el5.ppc",
"5Client:nss_ldap-0:253-12.el5.ppc64",
"5Client:nss_ldap-0:253-12.el5.s390",
"5Client:nss_ldap-0:253-12.el5.s390x",
"5Client:nss_ldap-0:253-12.el5.src",
"5Client:nss_ldap-0:253-12.el5.x86_64",
"5Client:nss_ldap-debuginfo-0:253-12.el5.i386",
"5Client:nss_ldap-debuginfo-0:253-12.el5.ia64",
"5Client:nss_ldap-debuginfo-0:253-12.el5.ppc",
"5Client:nss_ldap-debuginfo-0:253-12.el5.ppc64",
"5Client:nss_ldap-debuginfo-0:253-12.el5.s390",
"5Client:nss_ldap-debuginfo-0:253-12.el5.s390x",
"5Client:nss_ldap-debuginfo-0:253-12.el5.x86_64",
"5Server:nss_ldap-0:253-12.el5.i386",
"5Server:nss_ldap-0:253-12.el5.ia64",
"5Server:nss_ldap-0:253-12.el5.ppc",
"5Server:nss_ldap-0:253-12.el5.ppc64",
"5Server:nss_ldap-0:253-12.el5.s390",
"5Server:nss_ldap-0:253-12.el5.s390x",
"5Server:nss_ldap-0:253-12.el5.src",
"5Server:nss_ldap-0:253-12.el5.x86_64",
"5Server:nss_ldap-debuginfo-0:253-12.el5.i386",
"5Server:nss_ldap-debuginfo-0:253-12.el5.ia64",
"5Server:nss_ldap-debuginfo-0:253-12.el5.ppc",
"5Server:nss_ldap-debuginfo-0:253-12.el5.ppc64",
"5Server:nss_ldap-debuginfo-0:253-12.el5.s390",
"5Server:nss_ldap-debuginfo-0:253-12.el5.s390x",
"5Server:nss_ldap-debuginfo-0:253-12.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5794"
},
{
"category": "external",
"summary": "RHBZ#367461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=367461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5794",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5794"
}
],
"release_date": "2005-04-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-05-20T14:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:nss_ldap-0:253-12.el5.i386",
"5Client:nss_ldap-0:253-12.el5.ia64",
"5Client:nss_ldap-0:253-12.el5.ppc",
"5Client:nss_ldap-0:253-12.el5.ppc64",
"5Client:nss_ldap-0:253-12.el5.s390",
"5Client:nss_ldap-0:253-12.el5.s390x",
"5Client:nss_ldap-0:253-12.el5.src",
"5Client:nss_ldap-0:253-12.el5.x86_64",
"5Client:nss_ldap-debuginfo-0:253-12.el5.i386",
"5Client:nss_ldap-debuginfo-0:253-12.el5.ia64",
"5Client:nss_ldap-debuginfo-0:253-12.el5.ppc",
"5Client:nss_ldap-debuginfo-0:253-12.el5.ppc64",
"5Client:nss_ldap-debuginfo-0:253-12.el5.s390",
"5Client:nss_ldap-debuginfo-0:253-12.el5.s390x",
"5Client:nss_ldap-debuginfo-0:253-12.el5.x86_64",
"5Server:nss_ldap-0:253-12.el5.i386",
"5Server:nss_ldap-0:253-12.el5.ia64",
"5Server:nss_ldap-0:253-12.el5.ppc",
"5Server:nss_ldap-0:253-12.el5.ppc64",
"5Server:nss_ldap-0:253-12.el5.s390",
"5Server:nss_ldap-0:253-12.el5.s390x",
"5Server:nss_ldap-0:253-12.el5.src",
"5Server:nss_ldap-0:253-12.el5.x86_64",
"5Server:nss_ldap-debuginfo-0:253-12.el5.i386",
"5Server:nss_ldap-debuginfo-0:253-12.el5.ia64",
"5Server:nss_ldap-debuginfo-0:253-12.el5.ppc",
"5Server:nss_ldap-debuginfo-0:253-12.el5.ppc64",
"5Server:nss_ldap-debuginfo-0:253-12.el5.s390",
"5Server:nss_ldap-debuginfo-0:253-12.el5.s390x",
"5Server:nss_ldap-debuginfo-0:253-12.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0389"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nss_ldap randomly replying with wrong user\u0027s data"
}
]
}
rhsa-2008:0715
Vulnerability from csaf_redhat
Published
2008-07-24 16:53
Modified
2025-11-21 17:33
Summary
Red Hat Security Advisory: nss_ldap security and bug fix update
Notes
Topic
An updated nss_ldap package that fixes a security issue and several bugs is
now available.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
Details
The nss_ldap package contains the nss_ldap and pam_ldap modules. The
nss_ldap module is a plug-in which allows applications to retrieve
information about users and groups from a directory server. The pam_ldap
module allows PAM-aware applications to use a directory server to verify
user passwords.
A race condition was discovered in nss_ldap, which affected certain
applications that make LDAP connections, such as Dovecot. This could cause
nss_ldap to answer a request for information about one user with the
information about a different user. (CVE-2007-5794)
As well, this updated package fixes the following bugs:
* in certain situations, on Itanium(R) architectures, when an application
performed an LDAP lookup for a highly populated group, for example,
containing more than 150 members, the application crashed, or may have
caused a segmentation fault. As well, this issue may have caused commands,
such as "ls", to return a "ber_free_buf: Assertion" error.
* when an application enumerated members of a netgroup, the nss_ldap
module returned a successful status result and the netgroup name, even
when the netgroup did not exist. This behavior was not consistent with
other modules. In this updated package, nss_ldap no longer returns a
successful status when the netgroup does not exist.
* in master and slave server environments, with systems that were
configured to use a read-only directory server, if user log in attempts
were denied because their passwords had expired, and users attempted to
immediately change their passwords, the replication server returned an LDAP
referral, instructing the pam_ldap module to resissue its request to a
different server; however, the pam_ldap module failed to do so. In these
situations, an error such as the following occurred:
LDAP password information update failed: Can't contact LDAP server
Insufficient 'write' privilege to the 'userPassword' attribute of entry
[entry]
In this updated package, password changes are allowed when binding against
a slave server, which resolves this issue.
* when a system used a directory server for naming information, and
"nss_initgroups_ignoreusers root" was configured in "/etc/ldap.conf",
dbus-daemon-1 would hang. Running the "service messagebus start" command
did not start the service, and it did not fail, which would stop the boot
process if it was not cancelled.
As well, this updated package upgrades nss_ldap to the version as shipped
with Red Hat Enterprise Linux 5.
Users of nss_ldap are advised to upgrade to this updated package, which
resolves these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated nss_ldap package that fixes a security issue and several bugs is\nnow available.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The nss_ldap package contains the nss_ldap and pam_ldap modules. The\nnss_ldap module is a plug-in which allows applications to retrieve\ninformation about users and groups from a directory server. The pam_ldap\nmodule allows PAM-aware applications to use a directory server to verify\nuser passwords.\n\nA race condition was discovered in nss_ldap, which affected certain\napplications that make LDAP connections, such as Dovecot. This could cause\nnss_ldap to answer a request for information about one user with the\ninformation about a different user. (CVE-2007-5794)\n\nAs well, this updated package fixes the following bugs:\n\n* in certain situations, on Itanium(R) architectures, when an application\nperformed an LDAP lookup for a highly populated group, for example,\ncontaining more than 150 members, the application crashed, or may have\ncaused a segmentation fault. As well, this issue may have caused commands,\nsuch as \"ls\", to return a \"ber_free_buf: Assertion\" error.\n\n* when an application enumerated members of a netgroup, the nss_ldap\nmodule returned a successful status result and the netgroup name, even\nwhen the netgroup did not exist. This behavior was not consistent with\nother modules. In this updated package, nss_ldap no longer returns a\nsuccessful status when the netgroup does not exist.\n\n* in master and slave server environments, with systems that were\nconfigured to use a read-only directory server, if user log in attempts\nwere denied because their passwords had expired, and users attempted to\nimmediately change their passwords, the replication server returned an LDAP\nreferral, instructing the pam_ldap module to resissue its request to a\ndifferent server; however, the pam_ldap module failed to do so. In these\nsituations, an error such as the following occurred:\n\nLDAP password information update failed: Can\u0027t contact LDAP server\nInsufficient \u0027write\u0027 privilege to the \u0027userPassword\u0027 attribute of entry\n[entry]\n\nIn this updated package, password changes are allowed when binding against\na slave server, which resolves this issue.\n\n* when a system used a directory server for naming information, and\n\"nss_initgroups_ignoreusers root\" was configured in \"/etc/ldap.conf\",\ndbus-daemon-1 would hang. Running the \"service messagebus start\" command\ndid not start the service, and it did not fail, which would stop the boot\nprocess if it was not cancelled.\n\nAs well, this updated package upgrades nss_ldap to the version as shipped\nwith Red Hat Enterprise Linux 5.\n\nUsers of nss_ldap are advised to upgrade to this updated package, which\nresolves these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0715",
"url": "https://access.redhat.com/errata/RHSA-2008:0715"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#low",
"url": "http://www.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "155187",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=155187"
},
{
"category": "external",
"summary": "233382",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=233382"
},
{
"category": "external",
"summary": "253997",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=253997"
},
{
"category": "external",
"summary": "367461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=367461"
},
{
"category": "external",
"summary": "401731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=401731"
},
{
"category": "external",
"summary": "429101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=429101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0715.json"
}
],
"title": "Red Hat Security Advisory: nss_ldap security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:33:40+00:00",
"generator": {
"date": "2025-11-21T17:33:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2008:0715",
"initial_release_date": "2008-07-24T16:53:00+00:00",
"revision_history": [
{
"date": "2008-07-24T16:53:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-07-24T12:57:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:33:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-5.el4.ia64",
"product": {
"name": "nss_ldap-0:253-5.el4.ia64",
"product_id": "nss_ldap-0:253-5.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-5.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-5.el4.ia64",
"product": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ia64",
"product_id": "nss_ldap-debuginfo-0:253-5.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-5.el4?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-5.el4.i386",
"product": {
"name": "nss_ldap-0:253-5.el4.i386",
"product_id": "nss_ldap-0:253-5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-5.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-5.el4.i386",
"product": {
"name": "nss_ldap-debuginfo-0:253-5.el4.i386",
"product_id": "nss_ldap-debuginfo-0:253-5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-5.el4?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-5.el4.src",
"product": {
"name": "nss_ldap-0:253-5.el4.src",
"product_id": "nss_ldap-0:253-5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-5.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-5.el4.x86_64",
"product": {
"name": "nss_ldap-0:253-5.el4.x86_64",
"product_id": "nss_ldap-0:253-5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-5.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-5.el4.x86_64",
"product": {
"name": "nss_ldap-debuginfo-0:253-5.el4.x86_64",
"product_id": "nss_ldap-debuginfo-0:253-5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-5.el4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-5.el4.ppc64",
"product": {
"name": "nss_ldap-0:253-5.el4.ppc64",
"product_id": "nss_ldap-0:253-5.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-5.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc64",
"product": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc64",
"product_id": "nss_ldap-debuginfo-0:253-5.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-5.el4?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-5.el4.ppc",
"product": {
"name": "nss_ldap-0:253-5.el4.ppc",
"product_id": "nss_ldap-0:253-5.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-5.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc",
"product": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc",
"product_id": "nss_ldap-debuginfo-0:253-5.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-5.el4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-5.el4.s390",
"product": {
"name": "nss_ldap-0:253-5.el4.s390",
"product_id": "nss_ldap-0:253-5.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-5.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-5.el4.s390",
"product": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390",
"product_id": "nss_ldap-debuginfo-0:253-5.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-5.el4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-5.el4.s390x",
"product": {
"name": "nss_ldap-0:253-5.el4.s390x",
"product_id": "nss_ldap-0:253-5.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-5.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-5.el4.s390x",
"product": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390x",
"product_id": "nss_ldap-debuginfo-0:253-5.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-5.el4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-0:253-5.el4.i386"
},
"product_reference": "nss_ldap-0:253-5.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-0:253-5.el4.ia64"
},
"product_reference": "nss_ldap-0:253-5.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-0:253-5.el4.ppc"
},
"product_reference": "nss_ldap-0:253-5.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-0:253-5.el4.ppc64"
},
"product_reference": "nss_ldap-0:253-5.el4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-0:253-5.el4.s390"
},
"product_reference": "nss_ldap-0:253-5.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-0:253-5.el4.s390x"
},
"product_reference": "nss_ldap-0:253-5.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-0:253-5.el4.src"
},
"product_reference": "nss_ldap-0:253-5.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-0:253-5.el4.x86_64"
},
"product_reference": "nss_ldap-0:253-5.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-debuginfo-0:253-5.el4.i386"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-debuginfo-0:253-5.el4.ia64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-debuginfo-0:253-5.el4.ppc"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-debuginfo-0:253-5.el4.ppc64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-debuginfo-0:253-5.el4.s390"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-debuginfo-0:253-5.el4.s390x"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-debuginfo-0:253-5.el4.x86_64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-0:253-5.el4.i386"
},
"product_reference": "nss_ldap-0:253-5.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-0:253-5.el4.ia64"
},
"product_reference": "nss_ldap-0:253-5.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-0:253-5.el4.ppc"
},
"product_reference": "nss_ldap-0:253-5.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-0:253-5.el4.ppc64"
},
"product_reference": "nss_ldap-0:253-5.el4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-0:253-5.el4.s390"
},
"product_reference": "nss_ldap-0:253-5.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-0:253-5.el4.s390x"
},
"product_reference": "nss_ldap-0:253-5.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-0:253-5.el4.src"
},
"product_reference": "nss_ldap-0:253-5.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-0:253-5.el4.x86_64"
},
"product_reference": "nss_ldap-0:253-5.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-debuginfo-0:253-5.el4.i386"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-debuginfo-0:253-5.el4.ia64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-debuginfo-0:253-5.el4.ppc"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-debuginfo-0:253-5.el4.ppc64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-debuginfo-0:253-5.el4.s390"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-debuginfo-0:253-5.el4.s390x"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-debuginfo-0:253-5.el4.x86_64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-0:253-5.el4.i386"
},
"product_reference": "nss_ldap-0:253-5.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-0:253-5.el4.ia64"
},
"product_reference": "nss_ldap-0:253-5.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-0:253-5.el4.ppc"
},
"product_reference": "nss_ldap-0:253-5.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-0:253-5.el4.ppc64"
},
"product_reference": "nss_ldap-0:253-5.el4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-0:253-5.el4.s390"
},
"product_reference": "nss_ldap-0:253-5.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-0:253-5.el4.s390x"
},
"product_reference": "nss_ldap-0:253-5.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-0:253-5.el4.src"
},
"product_reference": "nss_ldap-0:253-5.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-0:253-5.el4.x86_64"
},
"product_reference": "nss_ldap-0:253-5.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-debuginfo-0:253-5.el4.i386"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-debuginfo-0:253-5.el4.ia64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-debuginfo-0:253-5.el4.ppc"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-debuginfo-0:253-5.el4.ppc64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-debuginfo-0:253-5.el4.s390"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-debuginfo-0:253-5.el4.s390x"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-debuginfo-0:253-5.el4.x86_64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-0:253-5.el4.i386"
},
"product_reference": "nss_ldap-0:253-5.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-0:253-5.el4.ia64"
},
"product_reference": "nss_ldap-0:253-5.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-0:253-5.el4.ppc"
},
"product_reference": "nss_ldap-0:253-5.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-0:253-5.el4.ppc64"
},
"product_reference": "nss_ldap-0:253-5.el4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-0:253-5.el4.s390"
},
"product_reference": "nss_ldap-0:253-5.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-0:253-5.el4.s390x"
},
"product_reference": "nss_ldap-0:253-5.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-0:253-5.el4.src"
},
"product_reference": "nss_ldap-0:253-5.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-0:253-5.el4.x86_64"
},
"product_reference": "nss_ldap-0:253-5.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-debuginfo-0:253-5.el4.i386"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-debuginfo-0:253-5.el4.ia64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-debuginfo-0:253-5.el4.ppc"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-debuginfo-0:253-5.el4.ppc64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-debuginfo-0:253-5.el4.s390"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-debuginfo-0:253-5.el4.s390x"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-debuginfo-0:253-5.el4.x86_64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5794",
"discovery_date": "2005-04-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "367461"
}
],
"notes": [
{
"category": "description",
"text": "Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss_ldap randomly replying with wrong user\u0027s data",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:nss_ldap-0:253-5.el4.i386",
"4AS:nss_ldap-0:253-5.el4.ia64",
"4AS:nss_ldap-0:253-5.el4.ppc",
"4AS:nss_ldap-0:253-5.el4.ppc64",
"4AS:nss_ldap-0:253-5.el4.s390",
"4AS:nss_ldap-0:253-5.el4.s390x",
"4AS:nss_ldap-0:253-5.el4.src",
"4AS:nss_ldap-0:253-5.el4.x86_64",
"4AS:nss_ldap-debuginfo-0:253-5.el4.i386",
"4AS:nss_ldap-debuginfo-0:253-5.el4.ia64",
"4AS:nss_ldap-debuginfo-0:253-5.el4.ppc",
"4AS:nss_ldap-debuginfo-0:253-5.el4.ppc64",
"4AS:nss_ldap-debuginfo-0:253-5.el4.s390",
"4AS:nss_ldap-debuginfo-0:253-5.el4.s390x",
"4AS:nss_ldap-debuginfo-0:253-5.el4.x86_64",
"4Desktop:nss_ldap-0:253-5.el4.i386",
"4Desktop:nss_ldap-0:253-5.el4.ia64",
"4Desktop:nss_ldap-0:253-5.el4.ppc",
"4Desktop:nss_ldap-0:253-5.el4.ppc64",
"4Desktop:nss_ldap-0:253-5.el4.s390",
"4Desktop:nss_ldap-0:253-5.el4.s390x",
"4Desktop:nss_ldap-0:253-5.el4.src",
"4Desktop:nss_ldap-0:253-5.el4.x86_64",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.i386",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.ia64",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.ppc",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.ppc64",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.s390",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.s390x",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.x86_64",
"4ES:nss_ldap-0:253-5.el4.i386",
"4ES:nss_ldap-0:253-5.el4.ia64",
"4ES:nss_ldap-0:253-5.el4.ppc",
"4ES:nss_ldap-0:253-5.el4.ppc64",
"4ES:nss_ldap-0:253-5.el4.s390",
"4ES:nss_ldap-0:253-5.el4.s390x",
"4ES:nss_ldap-0:253-5.el4.src",
"4ES:nss_ldap-0:253-5.el4.x86_64",
"4ES:nss_ldap-debuginfo-0:253-5.el4.i386",
"4ES:nss_ldap-debuginfo-0:253-5.el4.ia64",
"4ES:nss_ldap-debuginfo-0:253-5.el4.ppc",
"4ES:nss_ldap-debuginfo-0:253-5.el4.ppc64",
"4ES:nss_ldap-debuginfo-0:253-5.el4.s390",
"4ES:nss_ldap-debuginfo-0:253-5.el4.s390x",
"4ES:nss_ldap-debuginfo-0:253-5.el4.x86_64",
"4WS:nss_ldap-0:253-5.el4.i386",
"4WS:nss_ldap-0:253-5.el4.ia64",
"4WS:nss_ldap-0:253-5.el4.ppc",
"4WS:nss_ldap-0:253-5.el4.ppc64",
"4WS:nss_ldap-0:253-5.el4.s390",
"4WS:nss_ldap-0:253-5.el4.s390x",
"4WS:nss_ldap-0:253-5.el4.src",
"4WS:nss_ldap-0:253-5.el4.x86_64",
"4WS:nss_ldap-debuginfo-0:253-5.el4.i386",
"4WS:nss_ldap-debuginfo-0:253-5.el4.ia64",
"4WS:nss_ldap-debuginfo-0:253-5.el4.ppc",
"4WS:nss_ldap-debuginfo-0:253-5.el4.ppc64",
"4WS:nss_ldap-debuginfo-0:253-5.el4.s390",
"4WS:nss_ldap-debuginfo-0:253-5.el4.s390x",
"4WS:nss_ldap-debuginfo-0:253-5.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5794"
},
{
"category": "external",
"summary": "RHBZ#367461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=367461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5794",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5794"
}
],
"release_date": "2005-04-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-07-24T16:53:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:nss_ldap-0:253-5.el4.i386",
"4AS:nss_ldap-0:253-5.el4.ia64",
"4AS:nss_ldap-0:253-5.el4.ppc",
"4AS:nss_ldap-0:253-5.el4.ppc64",
"4AS:nss_ldap-0:253-5.el4.s390",
"4AS:nss_ldap-0:253-5.el4.s390x",
"4AS:nss_ldap-0:253-5.el4.src",
"4AS:nss_ldap-0:253-5.el4.x86_64",
"4AS:nss_ldap-debuginfo-0:253-5.el4.i386",
"4AS:nss_ldap-debuginfo-0:253-5.el4.ia64",
"4AS:nss_ldap-debuginfo-0:253-5.el4.ppc",
"4AS:nss_ldap-debuginfo-0:253-5.el4.ppc64",
"4AS:nss_ldap-debuginfo-0:253-5.el4.s390",
"4AS:nss_ldap-debuginfo-0:253-5.el4.s390x",
"4AS:nss_ldap-debuginfo-0:253-5.el4.x86_64",
"4Desktop:nss_ldap-0:253-5.el4.i386",
"4Desktop:nss_ldap-0:253-5.el4.ia64",
"4Desktop:nss_ldap-0:253-5.el4.ppc",
"4Desktop:nss_ldap-0:253-5.el4.ppc64",
"4Desktop:nss_ldap-0:253-5.el4.s390",
"4Desktop:nss_ldap-0:253-5.el4.s390x",
"4Desktop:nss_ldap-0:253-5.el4.src",
"4Desktop:nss_ldap-0:253-5.el4.x86_64",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.i386",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.ia64",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.ppc",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.ppc64",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.s390",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.s390x",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.x86_64",
"4ES:nss_ldap-0:253-5.el4.i386",
"4ES:nss_ldap-0:253-5.el4.ia64",
"4ES:nss_ldap-0:253-5.el4.ppc",
"4ES:nss_ldap-0:253-5.el4.ppc64",
"4ES:nss_ldap-0:253-5.el4.s390",
"4ES:nss_ldap-0:253-5.el4.s390x",
"4ES:nss_ldap-0:253-5.el4.src",
"4ES:nss_ldap-0:253-5.el4.x86_64",
"4ES:nss_ldap-debuginfo-0:253-5.el4.i386",
"4ES:nss_ldap-debuginfo-0:253-5.el4.ia64",
"4ES:nss_ldap-debuginfo-0:253-5.el4.ppc",
"4ES:nss_ldap-debuginfo-0:253-5.el4.ppc64",
"4ES:nss_ldap-debuginfo-0:253-5.el4.s390",
"4ES:nss_ldap-debuginfo-0:253-5.el4.s390x",
"4ES:nss_ldap-debuginfo-0:253-5.el4.x86_64",
"4WS:nss_ldap-0:253-5.el4.i386",
"4WS:nss_ldap-0:253-5.el4.ia64",
"4WS:nss_ldap-0:253-5.el4.ppc",
"4WS:nss_ldap-0:253-5.el4.ppc64",
"4WS:nss_ldap-0:253-5.el4.s390",
"4WS:nss_ldap-0:253-5.el4.s390x",
"4WS:nss_ldap-0:253-5.el4.src",
"4WS:nss_ldap-0:253-5.el4.x86_64",
"4WS:nss_ldap-debuginfo-0:253-5.el4.i386",
"4WS:nss_ldap-debuginfo-0:253-5.el4.ia64",
"4WS:nss_ldap-debuginfo-0:253-5.el4.ppc",
"4WS:nss_ldap-debuginfo-0:253-5.el4.ppc64",
"4WS:nss_ldap-debuginfo-0:253-5.el4.s390",
"4WS:nss_ldap-debuginfo-0:253-5.el4.s390x",
"4WS:nss_ldap-debuginfo-0:253-5.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0715"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nss_ldap randomly replying with wrong user\u0027s data"
}
]
}
RHSA-2008:0715
Vulnerability from csaf_redhat
Published
2008-07-24 16:53
Modified
2025-11-21 17:33
Summary
Red Hat Security Advisory: nss_ldap security and bug fix update
Notes
Topic
An updated nss_ldap package that fixes a security issue and several bugs is
now available.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
Details
The nss_ldap package contains the nss_ldap and pam_ldap modules. The
nss_ldap module is a plug-in which allows applications to retrieve
information about users and groups from a directory server. The pam_ldap
module allows PAM-aware applications to use a directory server to verify
user passwords.
A race condition was discovered in nss_ldap, which affected certain
applications that make LDAP connections, such as Dovecot. This could cause
nss_ldap to answer a request for information about one user with the
information about a different user. (CVE-2007-5794)
As well, this updated package fixes the following bugs:
* in certain situations, on Itanium(R) architectures, when an application
performed an LDAP lookup for a highly populated group, for example,
containing more than 150 members, the application crashed, or may have
caused a segmentation fault. As well, this issue may have caused commands,
such as "ls", to return a "ber_free_buf: Assertion" error.
* when an application enumerated members of a netgroup, the nss_ldap
module returned a successful status result and the netgroup name, even
when the netgroup did not exist. This behavior was not consistent with
other modules. In this updated package, nss_ldap no longer returns a
successful status when the netgroup does not exist.
* in master and slave server environments, with systems that were
configured to use a read-only directory server, if user log in attempts
were denied because their passwords had expired, and users attempted to
immediately change their passwords, the replication server returned an LDAP
referral, instructing the pam_ldap module to resissue its request to a
different server; however, the pam_ldap module failed to do so. In these
situations, an error such as the following occurred:
LDAP password information update failed: Can't contact LDAP server
Insufficient 'write' privilege to the 'userPassword' attribute of entry
[entry]
In this updated package, password changes are allowed when binding against
a slave server, which resolves this issue.
* when a system used a directory server for naming information, and
"nss_initgroups_ignoreusers root" was configured in "/etc/ldap.conf",
dbus-daemon-1 would hang. Running the "service messagebus start" command
did not start the service, and it did not fail, which would stop the boot
process if it was not cancelled.
As well, this updated package upgrades nss_ldap to the version as shipped
with Red Hat Enterprise Linux 5.
Users of nss_ldap are advised to upgrade to this updated package, which
resolves these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated nss_ldap package that fixes a security issue and several bugs is\nnow available.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The nss_ldap package contains the nss_ldap and pam_ldap modules. The\nnss_ldap module is a plug-in which allows applications to retrieve\ninformation about users and groups from a directory server. The pam_ldap\nmodule allows PAM-aware applications to use a directory server to verify\nuser passwords.\n\nA race condition was discovered in nss_ldap, which affected certain\napplications that make LDAP connections, such as Dovecot. This could cause\nnss_ldap to answer a request for information about one user with the\ninformation about a different user. (CVE-2007-5794)\n\nAs well, this updated package fixes the following bugs:\n\n* in certain situations, on Itanium(R) architectures, when an application\nperformed an LDAP lookup for a highly populated group, for example,\ncontaining more than 150 members, the application crashed, or may have\ncaused a segmentation fault. As well, this issue may have caused commands,\nsuch as \"ls\", to return a \"ber_free_buf: Assertion\" error.\n\n* when an application enumerated members of a netgroup, the nss_ldap\nmodule returned a successful status result and the netgroup name, even\nwhen the netgroup did not exist. This behavior was not consistent with\nother modules. In this updated package, nss_ldap no longer returns a\nsuccessful status when the netgroup does not exist.\n\n* in master and slave server environments, with systems that were\nconfigured to use a read-only directory server, if user log in attempts\nwere denied because their passwords had expired, and users attempted to\nimmediately change their passwords, the replication server returned an LDAP\nreferral, instructing the pam_ldap module to resissue its request to a\ndifferent server; however, the pam_ldap module failed to do so. In these\nsituations, an error such as the following occurred:\n\nLDAP password information update failed: Can\u0027t contact LDAP server\nInsufficient \u0027write\u0027 privilege to the \u0027userPassword\u0027 attribute of entry\n[entry]\n\nIn this updated package, password changes are allowed when binding against\na slave server, which resolves this issue.\n\n* when a system used a directory server for naming information, and\n\"nss_initgroups_ignoreusers root\" was configured in \"/etc/ldap.conf\",\ndbus-daemon-1 would hang. Running the \"service messagebus start\" command\ndid not start the service, and it did not fail, which would stop the boot\nprocess if it was not cancelled.\n\nAs well, this updated package upgrades nss_ldap to the version as shipped\nwith Red Hat Enterprise Linux 5.\n\nUsers of nss_ldap are advised to upgrade to this updated package, which\nresolves these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0715",
"url": "https://access.redhat.com/errata/RHSA-2008:0715"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#low",
"url": "http://www.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "155187",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=155187"
},
{
"category": "external",
"summary": "233382",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=233382"
},
{
"category": "external",
"summary": "253997",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=253997"
},
{
"category": "external",
"summary": "367461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=367461"
},
{
"category": "external",
"summary": "401731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=401731"
},
{
"category": "external",
"summary": "429101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=429101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0715.json"
}
],
"title": "Red Hat Security Advisory: nss_ldap security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:33:40+00:00",
"generator": {
"date": "2025-11-21T17:33:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2008:0715",
"initial_release_date": "2008-07-24T16:53:00+00:00",
"revision_history": [
{
"date": "2008-07-24T16:53:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-07-24T12:57:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:33:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-5.el4.ia64",
"product": {
"name": "nss_ldap-0:253-5.el4.ia64",
"product_id": "nss_ldap-0:253-5.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-5.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-5.el4.ia64",
"product": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ia64",
"product_id": "nss_ldap-debuginfo-0:253-5.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-5.el4?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-5.el4.i386",
"product": {
"name": "nss_ldap-0:253-5.el4.i386",
"product_id": "nss_ldap-0:253-5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-5.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-5.el4.i386",
"product": {
"name": "nss_ldap-debuginfo-0:253-5.el4.i386",
"product_id": "nss_ldap-debuginfo-0:253-5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-5.el4?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-5.el4.src",
"product": {
"name": "nss_ldap-0:253-5.el4.src",
"product_id": "nss_ldap-0:253-5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-5.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-5.el4.x86_64",
"product": {
"name": "nss_ldap-0:253-5.el4.x86_64",
"product_id": "nss_ldap-0:253-5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-5.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-5.el4.x86_64",
"product": {
"name": "nss_ldap-debuginfo-0:253-5.el4.x86_64",
"product_id": "nss_ldap-debuginfo-0:253-5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-5.el4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-5.el4.ppc64",
"product": {
"name": "nss_ldap-0:253-5.el4.ppc64",
"product_id": "nss_ldap-0:253-5.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-5.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc64",
"product": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc64",
"product_id": "nss_ldap-debuginfo-0:253-5.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-5.el4?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-5.el4.ppc",
"product": {
"name": "nss_ldap-0:253-5.el4.ppc",
"product_id": "nss_ldap-0:253-5.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-5.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc",
"product": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc",
"product_id": "nss_ldap-debuginfo-0:253-5.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-5.el4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-5.el4.s390",
"product": {
"name": "nss_ldap-0:253-5.el4.s390",
"product_id": "nss_ldap-0:253-5.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-5.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-5.el4.s390",
"product": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390",
"product_id": "nss_ldap-debuginfo-0:253-5.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-5.el4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-5.el4.s390x",
"product": {
"name": "nss_ldap-0:253-5.el4.s390x",
"product_id": "nss_ldap-0:253-5.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-5.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-5.el4.s390x",
"product": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390x",
"product_id": "nss_ldap-debuginfo-0:253-5.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-5.el4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-0:253-5.el4.i386"
},
"product_reference": "nss_ldap-0:253-5.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-0:253-5.el4.ia64"
},
"product_reference": "nss_ldap-0:253-5.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-0:253-5.el4.ppc"
},
"product_reference": "nss_ldap-0:253-5.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-0:253-5.el4.ppc64"
},
"product_reference": "nss_ldap-0:253-5.el4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-0:253-5.el4.s390"
},
"product_reference": "nss_ldap-0:253-5.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-0:253-5.el4.s390x"
},
"product_reference": "nss_ldap-0:253-5.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-0:253-5.el4.src"
},
"product_reference": "nss_ldap-0:253-5.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-0:253-5.el4.x86_64"
},
"product_reference": "nss_ldap-0:253-5.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-debuginfo-0:253-5.el4.i386"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-debuginfo-0:253-5.el4.ia64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-debuginfo-0:253-5.el4.ppc"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-debuginfo-0:253-5.el4.ppc64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-debuginfo-0:253-5.el4.s390"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-debuginfo-0:253-5.el4.s390x"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-debuginfo-0:253-5.el4.x86_64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-0:253-5.el4.i386"
},
"product_reference": "nss_ldap-0:253-5.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-0:253-5.el4.ia64"
},
"product_reference": "nss_ldap-0:253-5.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-0:253-5.el4.ppc"
},
"product_reference": "nss_ldap-0:253-5.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-0:253-5.el4.ppc64"
},
"product_reference": "nss_ldap-0:253-5.el4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-0:253-5.el4.s390"
},
"product_reference": "nss_ldap-0:253-5.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-0:253-5.el4.s390x"
},
"product_reference": "nss_ldap-0:253-5.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-0:253-5.el4.src"
},
"product_reference": "nss_ldap-0:253-5.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-0:253-5.el4.x86_64"
},
"product_reference": "nss_ldap-0:253-5.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-debuginfo-0:253-5.el4.i386"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-debuginfo-0:253-5.el4.ia64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-debuginfo-0:253-5.el4.ppc"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-debuginfo-0:253-5.el4.ppc64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-debuginfo-0:253-5.el4.s390"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-debuginfo-0:253-5.el4.s390x"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-debuginfo-0:253-5.el4.x86_64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-0:253-5.el4.i386"
},
"product_reference": "nss_ldap-0:253-5.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-0:253-5.el4.ia64"
},
"product_reference": "nss_ldap-0:253-5.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-0:253-5.el4.ppc"
},
"product_reference": "nss_ldap-0:253-5.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-0:253-5.el4.ppc64"
},
"product_reference": "nss_ldap-0:253-5.el4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-0:253-5.el4.s390"
},
"product_reference": "nss_ldap-0:253-5.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-0:253-5.el4.s390x"
},
"product_reference": "nss_ldap-0:253-5.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-0:253-5.el4.src"
},
"product_reference": "nss_ldap-0:253-5.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-0:253-5.el4.x86_64"
},
"product_reference": "nss_ldap-0:253-5.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-debuginfo-0:253-5.el4.i386"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-debuginfo-0:253-5.el4.ia64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-debuginfo-0:253-5.el4.ppc"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-debuginfo-0:253-5.el4.ppc64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-debuginfo-0:253-5.el4.s390"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-debuginfo-0:253-5.el4.s390x"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-debuginfo-0:253-5.el4.x86_64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-0:253-5.el4.i386"
},
"product_reference": "nss_ldap-0:253-5.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-0:253-5.el4.ia64"
},
"product_reference": "nss_ldap-0:253-5.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-0:253-5.el4.ppc"
},
"product_reference": "nss_ldap-0:253-5.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-0:253-5.el4.ppc64"
},
"product_reference": "nss_ldap-0:253-5.el4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-0:253-5.el4.s390"
},
"product_reference": "nss_ldap-0:253-5.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-0:253-5.el4.s390x"
},
"product_reference": "nss_ldap-0:253-5.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-0:253-5.el4.src"
},
"product_reference": "nss_ldap-0:253-5.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-0:253-5.el4.x86_64"
},
"product_reference": "nss_ldap-0:253-5.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-debuginfo-0:253-5.el4.i386"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-debuginfo-0:253-5.el4.ia64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-debuginfo-0:253-5.el4.ppc"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-debuginfo-0:253-5.el4.ppc64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-debuginfo-0:253-5.el4.s390"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-debuginfo-0:253-5.el4.s390x"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-debuginfo-0:253-5.el4.x86_64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5794",
"discovery_date": "2005-04-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "367461"
}
],
"notes": [
{
"category": "description",
"text": "Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss_ldap randomly replying with wrong user\u0027s data",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:nss_ldap-0:253-5.el4.i386",
"4AS:nss_ldap-0:253-5.el4.ia64",
"4AS:nss_ldap-0:253-5.el4.ppc",
"4AS:nss_ldap-0:253-5.el4.ppc64",
"4AS:nss_ldap-0:253-5.el4.s390",
"4AS:nss_ldap-0:253-5.el4.s390x",
"4AS:nss_ldap-0:253-5.el4.src",
"4AS:nss_ldap-0:253-5.el4.x86_64",
"4AS:nss_ldap-debuginfo-0:253-5.el4.i386",
"4AS:nss_ldap-debuginfo-0:253-5.el4.ia64",
"4AS:nss_ldap-debuginfo-0:253-5.el4.ppc",
"4AS:nss_ldap-debuginfo-0:253-5.el4.ppc64",
"4AS:nss_ldap-debuginfo-0:253-5.el4.s390",
"4AS:nss_ldap-debuginfo-0:253-5.el4.s390x",
"4AS:nss_ldap-debuginfo-0:253-5.el4.x86_64",
"4Desktop:nss_ldap-0:253-5.el4.i386",
"4Desktop:nss_ldap-0:253-5.el4.ia64",
"4Desktop:nss_ldap-0:253-5.el4.ppc",
"4Desktop:nss_ldap-0:253-5.el4.ppc64",
"4Desktop:nss_ldap-0:253-5.el4.s390",
"4Desktop:nss_ldap-0:253-5.el4.s390x",
"4Desktop:nss_ldap-0:253-5.el4.src",
"4Desktop:nss_ldap-0:253-5.el4.x86_64",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.i386",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.ia64",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.ppc",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.ppc64",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.s390",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.s390x",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.x86_64",
"4ES:nss_ldap-0:253-5.el4.i386",
"4ES:nss_ldap-0:253-5.el4.ia64",
"4ES:nss_ldap-0:253-5.el4.ppc",
"4ES:nss_ldap-0:253-5.el4.ppc64",
"4ES:nss_ldap-0:253-5.el4.s390",
"4ES:nss_ldap-0:253-5.el4.s390x",
"4ES:nss_ldap-0:253-5.el4.src",
"4ES:nss_ldap-0:253-5.el4.x86_64",
"4ES:nss_ldap-debuginfo-0:253-5.el4.i386",
"4ES:nss_ldap-debuginfo-0:253-5.el4.ia64",
"4ES:nss_ldap-debuginfo-0:253-5.el4.ppc",
"4ES:nss_ldap-debuginfo-0:253-5.el4.ppc64",
"4ES:nss_ldap-debuginfo-0:253-5.el4.s390",
"4ES:nss_ldap-debuginfo-0:253-5.el4.s390x",
"4ES:nss_ldap-debuginfo-0:253-5.el4.x86_64",
"4WS:nss_ldap-0:253-5.el4.i386",
"4WS:nss_ldap-0:253-5.el4.ia64",
"4WS:nss_ldap-0:253-5.el4.ppc",
"4WS:nss_ldap-0:253-5.el4.ppc64",
"4WS:nss_ldap-0:253-5.el4.s390",
"4WS:nss_ldap-0:253-5.el4.s390x",
"4WS:nss_ldap-0:253-5.el4.src",
"4WS:nss_ldap-0:253-5.el4.x86_64",
"4WS:nss_ldap-debuginfo-0:253-5.el4.i386",
"4WS:nss_ldap-debuginfo-0:253-5.el4.ia64",
"4WS:nss_ldap-debuginfo-0:253-5.el4.ppc",
"4WS:nss_ldap-debuginfo-0:253-5.el4.ppc64",
"4WS:nss_ldap-debuginfo-0:253-5.el4.s390",
"4WS:nss_ldap-debuginfo-0:253-5.el4.s390x",
"4WS:nss_ldap-debuginfo-0:253-5.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5794"
},
{
"category": "external",
"summary": "RHBZ#367461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=367461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5794",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5794"
}
],
"release_date": "2005-04-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-07-24T16:53:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:nss_ldap-0:253-5.el4.i386",
"4AS:nss_ldap-0:253-5.el4.ia64",
"4AS:nss_ldap-0:253-5.el4.ppc",
"4AS:nss_ldap-0:253-5.el4.ppc64",
"4AS:nss_ldap-0:253-5.el4.s390",
"4AS:nss_ldap-0:253-5.el4.s390x",
"4AS:nss_ldap-0:253-5.el4.src",
"4AS:nss_ldap-0:253-5.el4.x86_64",
"4AS:nss_ldap-debuginfo-0:253-5.el4.i386",
"4AS:nss_ldap-debuginfo-0:253-5.el4.ia64",
"4AS:nss_ldap-debuginfo-0:253-5.el4.ppc",
"4AS:nss_ldap-debuginfo-0:253-5.el4.ppc64",
"4AS:nss_ldap-debuginfo-0:253-5.el4.s390",
"4AS:nss_ldap-debuginfo-0:253-5.el4.s390x",
"4AS:nss_ldap-debuginfo-0:253-5.el4.x86_64",
"4Desktop:nss_ldap-0:253-5.el4.i386",
"4Desktop:nss_ldap-0:253-5.el4.ia64",
"4Desktop:nss_ldap-0:253-5.el4.ppc",
"4Desktop:nss_ldap-0:253-5.el4.ppc64",
"4Desktop:nss_ldap-0:253-5.el4.s390",
"4Desktop:nss_ldap-0:253-5.el4.s390x",
"4Desktop:nss_ldap-0:253-5.el4.src",
"4Desktop:nss_ldap-0:253-5.el4.x86_64",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.i386",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.ia64",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.ppc",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.ppc64",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.s390",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.s390x",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.x86_64",
"4ES:nss_ldap-0:253-5.el4.i386",
"4ES:nss_ldap-0:253-5.el4.ia64",
"4ES:nss_ldap-0:253-5.el4.ppc",
"4ES:nss_ldap-0:253-5.el4.ppc64",
"4ES:nss_ldap-0:253-5.el4.s390",
"4ES:nss_ldap-0:253-5.el4.s390x",
"4ES:nss_ldap-0:253-5.el4.src",
"4ES:nss_ldap-0:253-5.el4.x86_64",
"4ES:nss_ldap-debuginfo-0:253-5.el4.i386",
"4ES:nss_ldap-debuginfo-0:253-5.el4.ia64",
"4ES:nss_ldap-debuginfo-0:253-5.el4.ppc",
"4ES:nss_ldap-debuginfo-0:253-5.el4.ppc64",
"4ES:nss_ldap-debuginfo-0:253-5.el4.s390",
"4ES:nss_ldap-debuginfo-0:253-5.el4.s390x",
"4ES:nss_ldap-debuginfo-0:253-5.el4.x86_64",
"4WS:nss_ldap-0:253-5.el4.i386",
"4WS:nss_ldap-0:253-5.el4.ia64",
"4WS:nss_ldap-0:253-5.el4.ppc",
"4WS:nss_ldap-0:253-5.el4.ppc64",
"4WS:nss_ldap-0:253-5.el4.s390",
"4WS:nss_ldap-0:253-5.el4.s390x",
"4WS:nss_ldap-0:253-5.el4.src",
"4WS:nss_ldap-0:253-5.el4.x86_64",
"4WS:nss_ldap-debuginfo-0:253-5.el4.i386",
"4WS:nss_ldap-debuginfo-0:253-5.el4.ia64",
"4WS:nss_ldap-debuginfo-0:253-5.el4.ppc",
"4WS:nss_ldap-debuginfo-0:253-5.el4.ppc64",
"4WS:nss_ldap-debuginfo-0:253-5.el4.s390",
"4WS:nss_ldap-debuginfo-0:253-5.el4.s390x",
"4WS:nss_ldap-debuginfo-0:253-5.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0715"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nss_ldap randomly replying with wrong user\u0027s data"
}
]
}
RHSA-2008:0389
Vulnerability from csaf_redhat
Published
2008-05-20 14:16
Modified
2025-11-21 17:33
Summary
Red Hat Security Advisory: nss_ldap security and bug fix update
Notes
Topic
An updated nss_ldap package that fixes a security issue and several bugs is
now available.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
Details
The nss_ldap package contains the nss_ldap and pam_ldap modules. The
nss_ldap module is a plug-in which allows applications to retrieve
information about users and groups from a directory server. The pam_ldap
module allows PAM-aware applications to use a directory server to verify
user passwords.
A race condition was discovered in nss_ldap which affected certain
applications which make LDAP connections, such as Dovecot. This could cause
nss_ldap to answer a request for information about one user with
information about a different user. (CVE-2007-5794)
In addition, these updated packages fix the following bugs:
* a build error prevented the nss_ldap module from being able to use DNS to
discover the location of a directory server. For example, when the
/etc/nsswitch.conf configuration file was configured to use "ldap", but no
"host" or "uri" option was configured in the /etc/ldap.conf configuration
file, no directory server was contacted, and no results were returned.
* the "port" option in the /etc/ldap.conf configuration file on client
machines was ignored. For example, if a directory server which you were
attempting to use was listening on a non-default port (i.e. not ports 389
or 636), it was only possible to use that directory server by including the
port number in the "uri" option. In this updated package, the "port" option
works as expected.
* pam_ldap failed to change an expired password if it had to follow a
referral to do so, which could occur, for example, when using a slave
directory server in a replicated environment. An error such as the
following occurred after entering a new password: "LDAP password
information update failed: Can't contact LDAP server Insufficient 'write'
privilege to the 'userPassword' attribute"
This has been resolved in this updated package.
* when the "pam_password exop_send_old" password-change method was
configured in the /etc/ldap.conf configuration file, a logic error in the
pam_ldap module caused client machines to attempt to change a user's
password twice. First, the pam_ldap module attempted to change the password
using the "exop" request, and then again using an LDAP modify request.
* on Red Hat Enterprise Linux 5.1, rebuilding nss_ldap-253-5.el5 when the
krb5-*-1.6.1-17.el5 packages were installed failed due to an error such as
the following:
+ /builddir/build/SOURCES/dlopen.sh ./nss_ldap-253/nss_ldap.so
dlopen() of "././nss_ldap-253/nss_ldap.so" failed:
./././nss_ldap-253/nss_ldap.so: undefined symbol: request_key
error: Bad exit status from /var/tmp/rpm-tmp.62652 (%build)
The missing libraries have been added, which resolves this issue.
When recursively enumerating the set of members in a given group, the
module would allocate insufficient space for storing the set of member
names if the group itself contained other groups, thus corrupting the heap.
This update includes a backported fix for this bug.
Users of nss_ldap should upgrade to these updated packages, which contain
backported patches to correct this issue and fix these bugs.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated nss_ldap package that fixes a security issue and several bugs is\nnow available.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The nss_ldap package contains the nss_ldap and pam_ldap modules. The\nnss_ldap module is a plug-in which allows applications to retrieve\ninformation about users and groups from a directory server. The pam_ldap\nmodule allows PAM-aware applications to use a directory server to verify\nuser passwords.\n\nA race condition was discovered in nss_ldap which affected certain\napplications which make LDAP connections, such as Dovecot. This could cause\nnss_ldap to answer a request for information about one user with\ninformation about a different user. (CVE-2007-5794)\n\nIn addition, these updated packages fix the following bugs:\n\n* a build error prevented the nss_ldap module from being able to use DNS to\ndiscover the location of a directory server. For example, when the\n/etc/nsswitch.conf configuration file was configured to use \"ldap\", but no\n\"host\" or \"uri\" option was configured in the /etc/ldap.conf configuration\nfile, no directory server was contacted, and no results were returned.\n\n* the \"port\" option in the /etc/ldap.conf configuration file on client\nmachines was ignored. For example, if a directory server which you were\nattempting to use was listening on a non-default port (i.e. not ports 389\nor 636), it was only possible to use that directory server by including the\nport number in the \"uri\" option. In this updated package, the \"port\" option\nworks as expected.\n\n* pam_ldap failed to change an expired password if it had to follow a\nreferral to do so, which could occur, for example, when using a slave\ndirectory server in a replicated environment. An error such as the\nfollowing occurred after entering a new password: \"LDAP password\ninformation update failed: Can\u0027t contact LDAP server Insufficient \u0027write\u0027\nprivilege to the \u0027userPassword\u0027 attribute\"\n\nThis has been resolved in this updated package.\n\n* when the \"pam_password exop_send_old\" password-change method was\nconfigured in the /etc/ldap.conf configuration file, a logic error in the\npam_ldap module caused client machines to attempt to change a user\u0027s\npassword twice. First, the pam_ldap module attempted to change the password\nusing the \"exop\" request, and then again using an LDAP modify request.\n\n* on Red Hat Enterprise Linux 5.1, rebuilding nss_ldap-253-5.el5 when the\nkrb5-*-1.6.1-17.el5 packages were installed failed due to an error such as\nthe following:\n\n\t+ /builddir/build/SOURCES/dlopen.sh ./nss_ldap-253/nss_ldap.so\n\tdlopen() of \"././nss_ldap-253/nss_ldap.so\" failed:\n\t./././nss_ldap-253/nss_ldap.so: undefined symbol: request_key\n\terror: Bad exit status from /var/tmp/rpm-tmp.62652 (%build)\n\nThe missing libraries have been added, which resolves this issue.\n\nWhen recursively enumerating the set of members in a given group, the\nmodule would allocate insufficient space for storing the set of member\nnames if the group itself contained other groups, thus corrupting the heap.\nThis update includes a backported fix for this bug.\n\nUsers of nss_ldap should upgrade to these updated packages, which contain\nbackported patches to correct this issue and fix these bugs.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0389",
"url": "https://access.redhat.com/errata/RHSA-2008:0389"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "254172",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=254172"
},
{
"category": "external",
"summary": "364501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=364501"
},
{
"category": "external",
"summary": "367461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=367461"
},
{
"category": "external",
"summary": "427370",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427370"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0389.json"
}
],
"title": "Red Hat Security Advisory: nss_ldap security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:33:17+00:00",
"generator": {
"date": "2025-11-21T17:33:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2008:0389",
"initial_release_date": "2008-05-20T14:16:00+00:00",
"revision_history": [
{
"date": "2008-05-20T14:16:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-05-21T10:15:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:33:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-12.el5.src",
"product": {
"name": "nss_ldap-0:253-12.el5.src",
"product_id": "nss_ldap-0:253-12.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-12.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-12.el5.x86_64",
"product": {
"name": "nss_ldap-0:253-12.el5.x86_64",
"product_id": "nss_ldap-0:253-12.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-12.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-12.el5.x86_64",
"product": {
"name": "nss_ldap-debuginfo-0:253-12.el5.x86_64",
"product_id": "nss_ldap-debuginfo-0:253-12.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-12.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-12.el5.i386",
"product": {
"name": "nss_ldap-0:253-12.el5.i386",
"product_id": "nss_ldap-0:253-12.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-12.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-12.el5.i386",
"product": {
"name": "nss_ldap-debuginfo-0:253-12.el5.i386",
"product_id": "nss_ldap-debuginfo-0:253-12.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-12.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-12.el5.ia64",
"product": {
"name": "nss_ldap-0:253-12.el5.ia64",
"product_id": "nss_ldap-0:253-12.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-12.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-12.el5.ia64",
"product": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ia64",
"product_id": "nss_ldap-debuginfo-0:253-12.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-12.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-12.el5.ppc64",
"product": {
"name": "nss_ldap-0:253-12.el5.ppc64",
"product_id": "nss_ldap-0:253-12.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-12.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-12.el5.ppc64",
"product": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ppc64",
"product_id": "nss_ldap-debuginfo-0:253-12.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-12.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-12.el5.ppc",
"product": {
"name": "nss_ldap-0:253-12.el5.ppc",
"product_id": "nss_ldap-0:253-12.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-12.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-12.el5.ppc",
"product": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ppc",
"product_id": "nss_ldap-debuginfo-0:253-12.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-12.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-12.el5.s390",
"product": {
"name": "nss_ldap-0:253-12.el5.s390",
"product_id": "nss_ldap-0:253-12.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-12.el5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-12.el5.s390",
"product": {
"name": "nss_ldap-debuginfo-0:253-12.el5.s390",
"product_id": "nss_ldap-debuginfo-0:253-12.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-12.el5?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-12.el5.s390x",
"product": {
"name": "nss_ldap-0:253-12.el5.s390x",
"product_id": "nss_ldap-0:253-12.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-12.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-12.el5.s390x",
"product": {
"name": "nss_ldap-debuginfo-0:253-12.el5.s390x",
"product_id": "nss_ldap-debuginfo-0:253-12.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-12.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-0:253-12.el5.i386"
},
"product_reference": "nss_ldap-0:253-12.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-0:253-12.el5.ia64"
},
"product_reference": "nss_ldap-0:253-12.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-0:253-12.el5.ppc"
},
"product_reference": "nss_ldap-0:253-12.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-0:253-12.el5.ppc64"
},
"product_reference": "nss_ldap-0:253-12.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-0:253-12.el5.s390"
},
"product_reference": "nss_ldap-0:253-12.el5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-0:253-12.el5.s390x"
},
"product_reference": "nss_ldap-0:253-12.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-0:253-12.el5.src"
},
"product_reference": "nss_ldap-0:253-12.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-0:253-12.el5.x86_64"
},
"product_reference": "nss_ldap-0:253-12.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-debuginfo-0:253-12.el5.i386"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-debuginfo-0:253-12.el5.ia64"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-debuginfo-0:253-12.el5.ppc"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-debuginfo-0:253-12.el5.ppc64"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-debuginfo-0:253-12.el5.s390"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-debuginfo-0:253-12.el5.s390x"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-debuginfo-0:253-12.el5.x86_64"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-0:253-12.el5.i386"
},
"product_reference": "nss_ldap-0:253-12.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-0:253-12.el5.ia64"
},
"product_reference": "nss_ldap-0:253-12.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-0:253-12.el5.ppc"
},
"product_reference": "nss_ldap-0:253-12.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-0:253-12.el5.ppc64"
},
"product_reference": "nss_ldap-0:253-12.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-0:253-12.el5.s390"
},
"product_reference": "nss_ldap-0:253-12.el5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-0:253-12.el5.s390x"
},
"product_reference": "nss_ldap-0:253-12.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-0:253-12.el5.src"
},
"product_reference": "nss_ldap-0:253-12.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-0:253-12.el5.x86_64"
},
"product_reference": "nss_ldap-0:253-12.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-debuginfo-0:253-12.el5.i386"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-debuginfo-0:253-12.el5.ia64"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-debuginfo-0:253-12.el5.ppc"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-debuginfo-0:253-12.el5.ppc64"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-debuginfo-0:253-12.el5.s390"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-debuginfo-0:253-12.el5.s390x"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-debuginfo-0:253-12.el5.x86_64"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5794",
"discovery_date": "2005-04-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "367461"
}
],
"notes": [
{
"category": "description",
"text": "Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss_ldap randomly replying with wrong user\u0027s data",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:nss_ldap-0:253-12.el5.i386",
"5Client:nss_ldap-0:253-12.el5.ia64",
"5Client:nss_ldap-0:253-12.el5.ppc",
"5Client:nss_ldap-0:253-12.el5.ppc64",
"5Client:nss_ldap-0:253-12.el5.s390",
"5Client:nss_ldap-0:253-12.el5.s390x",
"5Client:nss_ldap-0:253-12.el5.src",
"5Client:nss_ldap-0:253-12.el5.x86_64",
"5Client:nss_ldap-debuginfo-0:253-12.el5.i386",
"5Client:nss_ldap-debuginfo-0:253-12.el5.ia64",
"5Client:nss_ldap-debuginfo-0:253-12.el5.ppc",
"5Client:nss_ldap-debuginfo-0:253-12.el5.ppc64",
"5Client:nss_ldap-debuginfo-0:253-12.el5.s390",
"5Client:nss_ldap-debuginfo-0:253-12.el5.s390x",
"5Client:nss_ldap-debuginfo-0:253-12.el5.x86_64",
"5Server:nss_ldap-0:253-12.el5.i386",
"5Server:nss_ldap-0:253-12.el5.ia64",
"5Server:nss_ldap-0:253-12.el5.ppc",
"5Server:nss_ldap-0:253-12.el5.ppc64",
"5Server:nss_ldap-0:253-12.el5.s390",
"5Server:nss_ldap-0:253-12.el5.s390x",
"5Server:nss_ldap-0:253-12.el5.src",
"5Server:nss_ldap-0:253-12.el5.x86_64",
"5Server:nss_ldap-debuginfo-0:253-12.el5.i386",
"5Server:nss_ldap-debuginfo-0:253-12.el5.ia64",
"5Server:nss_ldap-debuginfo-0:253-12.el5.ppc",
"5Server:nss_ldap-debuginfo-0:253-12.el5.ppc64",
"5Server:nss_ldap-debuginfo-0:253-12.el5.s390",
"5Server:nss_ldap-debuginfo-0:253-12.el5.s390x",
"5Server:nss_ldap-debuginfo-0:253-12.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5794"
},
{
"category": "external",
"summary": "RHBZ#367461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=367461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5794",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5794"
}
],
"release_date": "2005-04-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-05-20T14:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:nss_ldap-0:253-12.el5.i386",
"5Client:nss_ldap-0:253-12.el5.ia64",
"5Client:nss_ldap-0:253-12.el5.ppc",
"5Client:nss_ldap-0:253-12.el5.ppc64",
"5Client:nss_ldap-0:253-12.el5.s390",
"5Client:nss_ldap-0:253-12.el5.s390x",
"5Client:nss_ldap-0:253-12.el5.src",
"5Client:nss_ldap-0:253-12.el5.x86_64",
"5Client:nss_ldap-debuginfo-0:253-12.el5.i386",
"5Client:nss_ldap-debuginfo-0:253-12.el5.ia64",
"5Client:nss_ldap-debuginfo-0:253-12.el5.ppc",
"5Client:nss_ldap-debuginfo-0:253-12.el5.ppc64",
"5Client:nss_ldap-debuginfo-0:253-12.el5.s390",
"5Client:nss_ldap-debuginfo-0:253-12.el5.s390x",
"5Client:nss_ldap-debuginfo-0:253-12.el5.x86_64",
"5Server:nss_ldap-0:253-12.el5.i386",
"5Server:nss_ldap-0:253-12.el5.ia64",
"5Server:nss_ldap-0:253-12.el5.ppc",
"5Server:nss_ldap-0:253-12.el5.ppc64",
"5Server:nss_ldap-0:253-12.el5.s390",
"5Server:nss_ldap-0:253-12.el5.s390x",
"5Server:nss_ldap-0:253-12.el5.src",
"5Server:nss_ldap-0:253-12.el5.x86_64",
"5Server:nss_ldap-debuginfo-0:253-12.el5.i386",
"5Server:nss_ldap-debuginfo-0:253-12.el5.ia64",
"5Server:nss_ldap-debuginfo-0:253-12.el5.ppc",
"5Server:nss_ldap-debuginfo-0:253-12.el5.ppc64",
"5Server:nss_ldap-debuginfo-0:253-12.el5.s390",
"5Server:nss_ldap-debuginfo-0:253-12.el5.s390x",
"5Server:nss_ldap-debuginfo-0:253-12.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0389"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nss_ldap randomly replying with wrong user\u0027s data"
}
]
}
rhsa-2008_0715
Vulnerability from csaf_redhat
Published
2008-07-24 16:53
Modified
2024-11-22 01:46
Summary
Red Hat Security Advisory: nss_ldap security and bug fix update
Notes
Topic
An updated nss_ldap package that fixes a security issue and several bugs is
now available.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
Details
The nss_ldap package contains the nss_ldap and pam_ldap modules. The
nss_ldap module is a plug-in which allows applications to retrieve
information about users and groups from a directory server. The pam_ldap
module allows PAM-aware applications to use a directory server to verify
user passwords.
A race condition was discovered in nss_ldap, which affected certain
applications that make LDAP connections, such as Dovecot. This could cause
nss_ldap to answer a request for information about one user with the
information about a different user. (CVE-2007-5794)
As well, this updated package fixes the following bugs:
* in certain situations, on Itanium(R) architectures, when an application
performed an LDAP lookup for a highly populated group, for example,
containing more than 150 members, the application crashed, or may have
caused a segmentation fault. As well, this issue may have caused commands,
such as "ls", to return a "ber_free_buf: Assertion" error.
* when an application enumerated members of a netgroup, the nss_ldap
module returned a successful status result and the netgroup name, even
when the netgroup did not exist. This behavior was not consistent with
other modules. In this updated package, nss_ldap no longer returns a
successful status when the netgroup does not exist.
* in master and slave server environments, with systems that were
configured to use a read-only directory server, if user log in attempts
were denied because their passwords had expired, and users attempted to
immediately change their passwords, the replication server returned an LDAP
referral, instructing the pam_ldap module to resissue its request to a
different server; however, the pam_ldap module failed to do so. In these
situations, an error such as the following occurred:
LDAP password information update failed: Can't contact LDAP server
Insufficient 'write' privilege to the 'userPassword' attribute of entry
[entry]
In this updated package, password changes are allowed when binding against
a slave server, which resolves this issue.
* when a system used a directory server for naming information, and
"nss_initgroups_ignoreusers root" was configured in "/etc/ldap.conf",
dbus-daemon-1 would hang. Running the "service messagebus start" command
did not start the service, and it did not fail, which would stop the boot
process if it was not cancelled.
As well, this updated package upgrades nss_ldap to the version as shipped
with Red Hat Enterprise Linux 5.
Users of nss_ldap are advised to upgrade to this updated package, which
resolves these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated nss_ldap package that fixes a security issue and several bugs is\nnow available.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The nss_ldap package contains the nss_ldap and pam_ldap modules. The\nnss_ldap module is a plug-in which allows applications to retrieve\ninformation about users and groups from a directory server. The pam_ldap\nmodule allows PAM-aware applications to use a directory server to verify\nuser passwords.\n\nA race condition was discovered in nss_ldap, which affected certain\napplications that make LDAP connections, such as Dovecot. This could cause\nnss_ldap to answer a request for information about one user with the\ninformation about a different user. (CVE-2007-5794)\n\nAs well, this updated package fixes the following bugs:\n\n* in certain situations, on Itanium(R) architectures, when an application\nperformed an LDAP lookup for a highly populated group, for example,\ncontaining more than 150 members, the application crashed, or may have\ncaused a segmentation fault. As well, this issue may have caused commands,\nsuch as \"ls\", to return a \"ber_free_buf: Assertion\" error.\n\n* when an application enumerated members of a netgroup, the nss_ldap\nmodule returned a successful status result and the netgroup name, even\nwhen the netgroup did not exist. This behavior was not consistent with\nother modules. In this updated package, nss_ldap no longer returns a\nsuccessful status when the netgroup does not exist.\n\n* in master and slave server environments, with systems that were\nconfigured to use a read-only directory server, if user log in attempts\nwere denied because their passwords had expired, and users attempted to\nimmediately change their passwords, the replication server returned an LDAP\nreferral, instructing the pam_ldap module to resissue its request to a\ndifferent server; however, the pam_ldap module failed to do so. In these\nsituations, an error such as the following occurred:\n\nLDAP password information update failed: Can\u0027t contact LDAP server\nInsufficient \u0027write\u0027 privilege to the \u0027userPassword\u0027 attribute of entry\n[entry]\n\nIn this updated package, password changes are allowed when binding against\na slave server, which resolves this issue.\n\n* when a system used a directory server for naming information, and\n\"nss_initgroups_ignoreusers root\" was configured in \"/etc/ldap.conf\",\ndbus-daemon-1 would hang. Running the \"service messagebus start\" command\ndid not start the service, and it did not fail, which would stop the boot\nprocess if it was not cancelled.\n\nAs well, this updated package upgrades nss_ldap to the version as shipped\nwith Red Hat Enterprise Linux 5.\n\nUsers of nss_ldap are advised to upgrade to this updated package, which\nresolves these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0715",
"url": "https://access.redhat.com/errata/RHSA-2008:0715"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#low",
"url": "http://www.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "155187",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=155187"
},
{
"category": "external",
"summary": "233382",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=233382"
},
{
"category": "external",
"summary": "253997",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=253997"
},
{
"category": "external",
"summary": "367461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=367461"
},
{
"category": "external",
"summary": "401731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=401731"
},
{
"category": "external",
"summary": "429101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=429101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0715.json"
}
],
"title": "Red Hat Security Advisory: nss_ldap security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T01:46:52+00:00",
"generator": {
"date": "2024-11-22T01:46:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2008:0715",
"initial_release_date": "2008-07-24T16:53:00+00:00",
"revision_history": [
{
"date": "2008-07-24T16:53:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-07-24T12:57:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T01:46:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-5.el4.ia64",
"product": {
"name": "nss_ldap-0:253-5.el4.ia64",
"product_id": "nss_ldap-0:253-5.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-5.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-5.el4.ia64",
"product": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ia64",
"product_id": "nss_ldap-debuginfo-0:253-5.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-5.el4?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-5.el4.i386",
"product": {
"name": "nss_ldap-0:253-5.el4.i386",
"product_id": "nss_ldap-0:253-5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-5.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-5.el4.i386",
"product": {
"name": "nss_ldap-debuginfo-0:253-5.el4.i386",
"product_id": "nss_ldap-debuginfo-0:253-5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-5.el4?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-5.el4.src",
"product": {
"name": "nss_ldap-0:253-5.el4.src",
"product_id": "nss_ldap-0:253-5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-5.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-5.el4.x86_64",
"product": {
"name": "nss_ldap-0:253-5.el4.x86_64",
"product_id": "nss_ldap-0:253-5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-5.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-5.el4.x86_64",
"product": {
"name": "nss_ldap-debuginfo-0:253-5.el4.x86_64",
"product_id": "nss_ldap-debuginfo-0:253-5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-5.el4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-5.el4.ppc64",
"product": {
"name": "nss_ldap-0:253-5.el4.ppc64",
"product_id": "nss_ldap-0:253-5.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-5.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc64",
"product": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc64",
"product_id": "nss_ldap-debuginfo-0:253-5.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-5.el4?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-5.el4.ppc",
"product": {
"name": "nss_ldap-0:253-5.el4.ppc",
"product_id": "nss_ldap-0:253-5.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-5.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc",
"product": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc",
"product_id": "nss_ldap-debuginfo-0:253-5.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-5.el4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-5.el4.s390",
"product": {
"name": "nss_ldap-0:253-5.el4.s390",
"product_id": "nss_ldap-0:253-5.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-5.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-5.el4.s390",
"product": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390",
"product_id": "nss_ldap-debuginfo-0:253-5.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-5.el4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-5.el4.s390x",
"product": {
"name": "nss_ldap-0:253-5.el4.s390x",
"product_id": "nss_ldap-0:253-5.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-5.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-5.el4.s390x",
"product": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390x",
"product_id": "nss_ldap-debuginfo-0:253-5.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-5.el4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-0:253-5.el4.i386"
},
"product_reference": "nss_ldap-0:253-5.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-0:253-5.el4.ia64"
},
"product_reference": "nss_ldap-0:253-5.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-0:253-5.el4.ppc"
},
"product_reference": "nss_ldap-0:253-5.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-0:253-5.el4.ppc64"
},
"product_reference": "nss_ldap-0:253-5.el4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-0:253-5.el4.s390"
},
"product_reference": "nss_ldap-0:253-5.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-0:253-5.el4.s390x"
},
"product_reference": "nss_ldap-0:253-5.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-0:253-5.el4.src"
},
"product_reference": "nss_ldap-0:253-5.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-0:253-5.el4.x86_64"
},
"product_reference": "nss_ldap-0:253-5.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-debuginfo-0:253-5.el4.i386"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-debuginfo-0:253-5.el4.ia64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-debuginfo-0:253-5.el4.ppc"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-debuginfo-0:253-5.el4.ppc64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-debuginfo-0:253-5.el4.s390"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-debuginfo-0:253-5.el4.s390x"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss_ldap-debuginfo-0:253-5.el4.x86_64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-0:253-5.el4.i386"
},
"product_reference": "nss_ldap-0:253-5.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-0:253-5.el4.ia64"
},
"product_reference": "nss_ldap-0:253-5.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-0:253-5.el4.ppc"
},
"product_reference": "nss_ldap-0:253-5.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-0:253-5.el4.ppc64"
},
"product_reference": "nss_ldap-0:253-5.el4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-0:253-5.el4.s390"
},
"product_reference": "nss_ldap-0:253-5.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-0:253-5.el4.s390x"
},
"product_reference": "nss_ldap-0:253-5.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-0:253-5.el4.src"
},
"product_reference": "nss_ldap-0:253-5.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-0:253-5.el4.x86_64"
},
"product_reference": "nss_ldap-0:253-5.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-debuginfo-0:253-5.el4.i386"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-debuginfo-0:253-5.el4.ia64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-debuginfo-0:253-5.el4.ppc"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-debuginfo-0:253-5.el4.ppc64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-debuginfo-0:253-5.el4.s390"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-debuginfo-0:253-5.el4.s390x"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss_ldap-debuginfo-0:253-5.el4.x86_64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-0:253-5.el4.i386"
},
"product_reference": "nss_ldap-0:253-5.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-0:253-5.el4.ia64"
},
"product_reference": "nss_ldap-0:253-5.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-0:253-5.el4.ppc"
},
"product_reference": "nss_ldap-0:253-5.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-0:253-5.el4.ppc64"
},
"product_reference": "nss_ldap-0:253-5.el4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-0:253-5.el4.s390"
},
"product_reference": "nss_ldap-0:253-5.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-0:253-5.el4.s390x"
},
"product_reference": "nss_ldap-0:253-5.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-0:253-5.el4.src"
},
"product_reference": "nss_ldap-0:253-5.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-0:253-5.el4.x86_64"
},
"product_reference": "nss_ldap-0:253-5.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-debuginfo-0:253-5.el4.i386"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-debuginfo-0:253-5.el4.ia64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-debuginfo-0:253-5.el4.ppc"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-debuginfo-0:253-5.el4.ppc64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-debuginfo-0:253-5.el4.s390"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-debuginfo-0:253-5.el4.s390x"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss_ldap-debuginfo-0:253-5.el4.x86_64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-0:253-5.el4.i386"
},
"product_reference": "nss_ldap-0:253-5.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-0:253-5.el4.ia64"
},
"product_reference": "nss_ldap-0:253-5.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-0:253-5.el4.ppc"
},
"product_reference": "nss_ldap-0:253-5.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-0:253-5.el4.ppc64"
},
"product_reference": "nss_ldap-0:253-5.el4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-0:253-5.el4.s390"
},
"product_reference": "nss_ldap-0:253-5.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-0:253-5.el4.s390x"
},
"product_reference": "nss_ldap-0:253-5.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-0:253-5.el4.src"
},
"product_reference": "nss_ldap-0:253-5.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-5.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-0:253-5.el4.x86_64"
},
"product_reference": "nss_ldap-0:253-5.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-debuginfo-0:253-5.el4.i386"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-debuginfo-0:253-5.el4.ia64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-debuginfo-0:253-5.el4.ppc"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-debuginfo-0:253-5.el4.ppc64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-debuginfo-0:253-5.el4.s390"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-debuginfo-0:253-5.el4.s390x"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-5.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss_ldap-debuginfo-0:253-5.el4.x86_64"
},
"product_reference": "nss_ldap-debuginfo-0:253-5.el4.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5794",
"discovery_date": "2005-04-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "367461"
}
],
"notes": [
{
"category": "description",
"text": "Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss_ldap randomly replying with wrong user\u0027s data",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:nss_ldap-0:253-5.el4.i386",
"4AS:nss_ldap-0:253-5.el4.ia64",
"4AS:nss_ldap-0:253-5.el4.ppc",
"4AS:nss_ldap-0:253-5.el4.ppc64",
"4AS:nss_ldap-0:253-5.el4.s390",
"4AS:nss_ldap-0:253-5.el4.s390x",
"4AS:nss_ldap-0:253-5.el4.src",
"4AS:nss_ldap-0:253-5.el4.x86_64",
"4AS:nss_ldap-debuginfo-0:253-5.el4.i386",
"4AS:nss_ldap-debuginfo-0:253-5.el4.ia64",
"4AS:nss_ldap-debuginfo-0:253-5.el4.ppc",
"4AS:nss_ldap-debuginfo-0:253-5.el4.ppc64",
"4AS:nss_ldap-debuginfo-0:253-5.el4.s390",
"4AS:nss_ldap-debuginfo-0:253-5.el4.s390x",
"4AS:nss_ldap-debuginfo-0:253-5.el4.x86_64",
"4Desktop:nss_ldap-0:253-5.el4.i386",
"4Desktop:nss_ldap-0:253-5.el4.ia64",
"4Desktop:nss_ldap-0:253-5.el4.ppc",
"4Desktop:nss_ldap-0:253-5.el4.ppc64",
"4Desktop:nss_ldap-0:253-5.el4.s390",
"4Desktop:nss_ldap-0:253-5.el4.s390x",
"4Desktop:nss_ldap-0:253-5.el4.src",
"4Desktop:nss_ldap-0:253-5.el4.x86_64",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.i386",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.ia64",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.ppc",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.ppc64",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.s390",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.s390x",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.x86_64",
"4ES:nss_ldap-0:253-5.el4.i386",
"4ES:nss_ldap-0:253-5.el4.ia64",
"4ES:nss_ldap-0:253-5.el4.ppc",
"4ES:nss_ldap-0:253-5.el4.ppc64",
"4ES:nss_ldap-0:253-5.el4.s390",
"4ES:nss_ldap-0:253-5.el4.s390x",
"4ES:nss_ldap-0:253-5.el4.src",
"4ES:nss_ldap-0:253-5.el4.x86_64",
"4ES:nss_ldap-debuginfo-0:253-5.el4.i386",
"4ES:nss_ldap-debuginfo-0:253-5.el4.ia64",
"4ES:nss_ldap-debuginfo-0:253-5.el4.ppc",
"4ES:nss_ldap-debuginfo-0:253-5.el4.ppc64",
"4ES:nss_ldap-debuginfo-0:253-5.el4.s390",
"4ES:nss_ldap-debuginfo-0:253-5.el4.s390x",
"4ES:nss_ldap-debuginfo-0:253-5.el4.x86_64",
"4WS:nss_ldap-0:253-5.el4.i386",
"4WS:nss_ldap-0:253-5.el4.ia64",
"4WS:nss_ldap-0:253-5.el4.ppc",
"4WS:nss_ldap-0:253-5.el4.ppc64",
"4WS:nss_ldap-0:253-5.el4.s390",
"4WS:nss_ldap-0:253-5.el4.s390x",
"4WS:nss_ldap-0:253-5.el4.src",
"4WS:nss_ldap-0:253-5.el4.x86_64",
"4WS:nss_ldap-debuginfo-0:253-5.el4.i386",
"4WS:nss_ldap-debuginfo-0:253-5.el4.ia64",
"4WS:nss_ldap-debuginfo-0:253-5.el4.ppc",
"4WS:nss_ldap-debuginfo-0:253-5.el4.ppc64",
"4WS:nss_ldap-debuginfo-0:253-5.el4.s390",
"4WS:nss_ldap-debuginfo-0:253-5.el4.s390x",
"4WS:nss_ldap-debuginfo-0:253-5.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5794"
},
{
"category": "external",
"summary": "RHBZ#367461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=367461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5794",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5794"
}
],
"release_date": "2005-04-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-07-24T16:53:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:nss_ldap-0:253-5.el4.i386",
"4AS:nss_ldap-0:253-5.el4.ia64",
"4AS:nss_ldap-0:253-5.el4.ppc",
"4AS:nss_ldap-0:253-5.el4.ppc64",
"4AS:nss_ldap-0:253-5.el4.s390",
"4AS:nss_ldap-0:253-5.el4.s390x",
"4AS:nss_ldap-0:253-5.el4.src",
"4AS:nss_ldap-0:253-5.el4.x86_64",
"4AS:nss_ldap-debuginfo-0:253-5.el4.i386",
"4AS:nss_ldap-debuginfo-0:253-5.el4.ia64",
"4AS:nss_ldap-debuginfo-0:253-5.el4.ppc",
"4AS:nss_ldap-debuginfo-0:253-5.el4.ppc64",
"4AS:nss_ldap-debuginfo-0:253-5.el4.s390",
"4AS:nss_ldap-debuginfo-0:253-5.el4.s390x",
"4AS:nss_ldap-debuginfo-0:253-5.el4.x86_64",
"4Desktop:nss_ldap-0:253-5.el4.i386",
"4Desktop:nss_ldap-0:253-5.el4.ia64",
"4Desktop:nss_ldap-0:253-5.el4.ppc",
"4Desktop:nss_ldap-0:253-5.el4.ppc64",
"4Desktop:nss_ldap-0:253-5.el4.s390",
"4Desktop:nss_ldap-0:253-5.el4.s390x",
"4Desktop:nss_ldap-0:253-5.el4.src",
"4Desktop:nss_ldap-0:253-5.el4.x86_64",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.i386",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.ia64",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.ppc",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.ppc64",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.s390",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.s390x",
"4Desktop:nss_ldap-debuginfo-0:253-5.el4.x86_64",
"4ES:nss_ldap-0:253-5.el4.i386",
"4ES:nss_ldap-0:253-5.el4.ia64",
"4ES:nss_ldap-0:253-5.el4.ppc",
"4ES:nss_ldap-0:253-5.el4.ppc64",
"4ES:nss_ldap-0:253-5.el4.s390",
"4ES:nss_ldap-0:253-5.el4.s390x",
"4ES:nss_ldap-0:253-5.el4.src",
"4ES:nss_ldap-0:253-5.el4.x86_64",
"4ES:nss_ldap-debuginfo-0:253-5.el4.i386",
"4ES:nss_ldap-debuginfo-0:253-5.el4.ia64",
"4ES:nss_ldap-debuginfo-0:253-5.el4.ppc",
"4ES:nss_ldap-debuginfo-0:253-5.el4.ppc64",
"4ES:nss_ldap-debuginfo-0:253-5.el4.s390",
"4ES:nss_ldap-debuginfo-0:253-5.el4.s390x",
"4ES:nss_ldap-debuginfo-0:253-5.el4.x86_64",
"4WS:nss_ldap-0:253-5.el4.i386",
"4WS:nss_ldap-0:253-5.el4.ia64",
"4WS:nss_ldap-0:253-5.el4.ppc",
"4WS:nss_ldap-0:253-5.el4.ppc64",
"4WS:nss_ldap-0:253-5.el4.s390",
"4WS:nss_ldap-0:253-5.el4.s390x",
"4WS:nss_ldap-0:253-5.el4.src",
"4WS:nss_ldap-0:253-5.el4.x86_64",
"4WS:nss_ldap-debuginfo-0:253-5.el4.i386",
"4WS:nss_ldap-debuginfo-0:253-5.el4.ia64",
"4WS:nss_ldap-debuginfo-0:253-5.el4.ppc",
"4WS:nss_ldap-debuginfo-0:253-5.el4.ppc64",
"4WS:nss_ldap-debuginfo-0:253-5.el4.s390",
"4WS:nss_ldap-debuginfo-0:253-5.el4.s390x",
"4WS:nss_ldap-debuginfo-0:253-5.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0715"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nss_ldap randomly replying with wrong user\u0027s data"
}
]
}
rhsa-2008:0389
Vulnerability from csaf_redhat
Published
2008-05-20 14:16
Modified
2025-11-21 17:33
Summary
Red Hat Security Advisory: nss_ldap security and bug fix update
Notes
Topic
An updated nss_ldap package that fixes a security issue and several bugs is
now available.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
Details
The nss_ldap package contains the nss_ldap and pam_ldap modules. The
nss_ldap module is a plug-in which allows applications to retrieve
information about users and groups from a directory server. The pam_ldap
module allows PAM-aware applications to use a directory server to verify
user passwords.
A race condition was discovered in nss_ldap which affected certain
applications which make LDAP connections, such as Dovecot. This could cause
nss_ldap to answer a request for information about one user with
information about a different user. (CVE-2007-5794)
In addition, these updated packages fix the following bugs:
* a build error prevented the nss_ldap module from being able to use DNS to
discover the location of a directory server. For example, when the
/etc/nsswitch.conf configuration file was configured to use "ldap", but no
"host" or "uri" option was configured in the /etc/ldap.conf configuration
file, no directory server was contacted, and no results were returned.
* the "port" option in the /etc/ldap.conf configuration file on client
machines was ignored. For example, if a directory server which you were
attempting to use was listening on a non-default port (i.e. not ports 389
or 636), it was only possible to use that directory server by including the
port number in the "uri" option. In this updated package, the "port" option
works as expected.
* pam_ldap failed to change an expired password if it had to follow a
referral to do so, which could occur, for example, when using a slave
directory server in a replicated environment. An error such as the
following occurred after entering a new password: "LDAP password
information update failed: Can't contact LDAP server Insufficient 'write'
privilege to the 'userPassword' attribute"
This has been resolved in this updated package.
* when the "pam_password exop_send_old" password-change method was
configured in the /etc/ldap.conf configuration file, a logic error in the
pam_ldap module caused client machines to attempt to change a user's
password twice. First, the pam_ldap module attempted to change the password
using the "exop" request, and then again using an LDAP modify request.
* on Red Hat Enterprise Linux 5.1, rebuilding nss_ldap-253-5.el5 when the
krb5-*-1.6.1-17.el5 packages were installed failed due to an error such as
the following:
+ /builddir/build/SOURCES/dlopen.sh ./nss_ldap-253/nss_ldap.so
dlopen() of "././nss_ldap-253/nss_ldap.so" failed:
./././nss_ldap-253/nss_ldap.so: undefined symbol: request_key
error: Bad exit status from /var/tmp/rpm-tmp.62652 (%build)
The missing libraries have been added, which resolves this issue.
When recursively enumerating the set of members in a given group, the
module would allocate insufficient space for storing the set of member
names if the group itself contained other groups, thus corrupting the heap.
This update includes a backported fix for this bug.
Users of nss_ldap should upgrade to these updated packages, which contain
backported patches to correct this issue and fix these bugs.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated nss_ldap package that fixes a security issue and several bugs is\nnow available.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The nss_ldap package contains the nss_ldap and pam_ldap modules. The\nnss_ldap module is a plug-in which allows applications to retrieve\ninformation about users and groups from a directory server. The pam_ldap\nmodule allows PAM-aware applications to use a directory server to verify\nuser passwords.\n\nA race condition was discovered in nss_ldap which affected certain\napplications which make LDAP connections, such as Dovecot. This could cause\nnss_ldap to answer a request for information about one user with\ninformation about a different user. (CVE-2007-5794)\n\nIn addition, these updated packages fix the following bugs:\n\n* a build error prevented the nss_ldap module from being able to use DNS to\ndiscover the location of a directory server. For example, when the\n/etc/nsswitch.conf configuration file was configured to use \"ldap\", but no\n\"host\" or \"uri\" option was configured in the /etc/ldap.conf configuration\nfile, no directory server was contacted, and no results were returned.\n\n* the \"port\" option in the /etc/ldap.conf configuration file on client\nmachines was ignored. For example, if a directory server which you were\nattempting to use was listening on a non-default port (i.e. not ports 389\nor 636), it was only possible to use that directory server by including the\nport number in the \"uri\" option. In this updated package, the \"port\" option\nworks as expected.\n\n* pam_ldap failed to change an expired password if it had to follow a\nreferral to do so, which could occur, for example, when using a slave\ndirectory server in a replicated environment. An error such as the\nfollowing occurred after entering a new password: \"LDAP password\ninformation update failed: Can\u0027t contact LDAP server Insufficient \u0027write\u0027\nprivilege to the \u0027userPassword\u0027 attribute\"\n\nThis has been resolved in this updated package.\n\n* when the \"pam_password exop_send_old\" password-change method was\nconfigured in the /etc/ldap.conf configuration file, a logic error in the\npam_ldap module caused client machines to attempt to change a user\u0027s\npassword twice. First, the pam_ldap module attempted to change the password\nusing the \"exop\" request, and then again using an LDAP modify request.\n\n* on Red Hat Enterprise Linux 5.1, rebuilding nss_ldap-253-5.el5 when the\nkrb5-*-1.6.1-17.el5 packages were installed failed due to an error such as\nthe following:\n\n\t+ /builddir/build/SOURCES/dlopen.sh ./nss_ldap-253/nss_ldap.so\n\tdlopen() of \"././nss_ldap-253/nss_ldap.so\" failed:\n\t./././nss_ldap-253/nss_ldap.so: undefined symbol: request_key\n\terror: Bad exit status from /var/tmp/rpm-tmp.62652 (%build)\n\nThe missing libraries have been added, which resolves this issue.\n\nWhen recursively enumerating the set of members in a given group, the\nmodule would allocate insufficient space for storing the set of member\nnames if the group itself contained other groups, thus corrupting the heap.\nThis update includes a backported fix for this bug.\n\nUsers of nss_ldap should upgrade to these updated packages, which contain\nbackported patches to correct this issue and fix these bugs.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0389",
"url": "https://access.redhat.com/errata/RHSA-2008:0389"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "254172",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=254172"
},
{
"category": "external",
"summary": "364501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=364501"
},
{
"category": "external",
"summary": "367461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=367461"
},
{
"category": "external",
"summary": "427370",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427370"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0389.json"
}
],
"title": "Red Hat Security Advisory: nss_ldap security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:33:17+00:00",
"generator": {
"date": "2025-11-21T17:33:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2008:0389",
"initial_release_date": "2008-05-20T14:16:00+00:00",
"revision_history": [
{
"date": "2008-05-20T14:16:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-05-21T10:15:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:33:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-12.el5.src",
"product": {
"name": "nss_ldap-0:253-12.el5.src",
"product_id": "nss_ldap-0:253-12.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-12.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-12.el5.x86_64",
"product": {
"name": "nss_ldap-0:253-12.el5.x86_64",
"product_id": "nss_ldap-0:253-12.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-12.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-12.el5.x86_64",
"product": {
"name": "nss_ldap-debuginfo-0:253-12.el5.x86_64",
"product_id": "nss_ldap-debuginfo-0:253-12.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-12.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-12.el5.i386",
"product": {
"name": "nss_ldap-0:253-12.el5.i386",
"product_id": "nss_ldap-0:253-12.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-12.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-12.el5.i386",
"product": {
"name": "nss_ldap-debuginfo-0:253-12.el5.i386",
"product_id": "nss_ldap-debuginfo-0:253-12.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-12.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-12.el5.ia64",
"product": {
"name": "nss_ldap-0:253-12.el5.ia64",
"product_id": "nss_ldap-0:253-12.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-12.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-12.el5.ia64",
"product": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ia64",
"product_id": "nss_ldap-debuginfo-0:253-12.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-12.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-12.el5.ppc64",
"product": {
"name": "nss_ldap-0:253-12.el5.ppc64",
"product_id": "nss_ldap-0:253-12.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-12.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-12.el5.ppc64",
"product": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ppc64",
"product_id": "nss_ldap-debuginfo-0:253-12.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-12.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-12.el5.ppc",
"product": {
"name": "nss_ldap-0:253-12.el5.ppc",
"product_id": "nss_ldap-0:253-12.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-12.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-12.el5.ppc",
"product": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ppc",
"product_id": "nss_ldap-debuginfo-0:253-12.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-12.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-12.el5.s390",
"product": {
"name": "nss_ldap-0:253-12.el5.s390",
"product_id": "nss_ldap-0:253-12.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-12.el5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-12.el5.s390",
"product": {
"name": "nss_ldap-debuginfo-0:253-12.el5.s390",
"product_id": "nss_ldap-debuginfo-0:253-12.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-12.el5?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "nss_ldap-0:253-12.el5.s390x",
"product": {
"name": "nss_ldap-0:253-12.el5.s390x",
"product_id": "nss_ldap-0:253-12.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap@253-12.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss_ldap-debuginfo-0:253-12.el5.s390x",
"product": {
"name": "nss_ldap-debuginfo-0:253-12.el5.s390x",
"product_id": "nss_ldap-debuginfo-0:253-12.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss_ldap-debuginfo@253-12.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-0:253-12.el5.i386"
},
"product_reference": "nss_ldap-0:253-12.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-0:253-12.el5.ia64"
},
"product_reference": "nss_ldap-0:253-12.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-0:253-12.el5.ppc"
},
"product_reference": "nss_ldap-0:253-12.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-0:253-12.el5.ppc64"
},
"product_reference": "nss_ldap-0:253-12.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-0:253-12.el5.s390"
},
"product_reference": "nss_ldap-0:253-12.el5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-0:253-12.el5.s390x"
},
"product_reference": "nss_ldap-0:253-12.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-0:253-12.el5.src"
},
"product_reference": "nss_ldap-0:253-12.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-0:253-12.el5.x86_64"
},
"product_reference": "nss_ldap-0:253-12.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-debuginfo-0:253-12.el5.i386"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-debuginfo-0:253-12.el5.ia64"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-debuginfo-0:253-12.el5.ppc"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-debuginfo-0:253-12.el5.ppc64"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-debuginfo-0:253-12.el5.s390"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-debuginfo-0:253-12.el5.s390x"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss_ldap-debuginfo-0:253-12.el5.x86_64"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-0:253-12.el5.i386"
},
"product_reference": "nss_ldap-0:253-12.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-0:253-12.el5.ia64"
},
"product_reference": "nss_ldap-0:253-12.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-0:253-12.el5.ppc"
},
"product_reference": "nss_ldap-0:253-12.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-0:253-12.el5.ppc64"
},
"product_reference": "nss_ldap-0:253-12.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-0:253-12.el5.s390"
},
"product_reference": "nss_ldap-0:253-12.el5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-0:253-12.el5.s390x"
},
"product_reference": "nss_ldap-0:253-12.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-0:253-12.el5.src"
},
"product_reference": "nss_ldap-0:253-12.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-0:253-12.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-0:253-12.el5.x86_64"
},
"product_reference": "nss_ldap-0:253-12.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-debuginfo-0:253-12.el5.i386"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-debuginfo-0:253-12.el5.ia64"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-debuginfo-0:253-12.el5.ppc"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-debuginfo-0:253-12.el5.ppc64"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-debuginfo-0:253-12.el5.s390"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-debuginfo-0:253-12.el5.s390x"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss_ldap-debuginfo-0:253-12.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss_ldap-debuginfo-0:253-12.el5.x86_64"
},
"product_reference": "nss_ldap-debuginfo-0:253-12.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5794",
"discovery_date": "2005-04-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "367461"
}
],
"notes": [
{
"category": "description",
"text": "Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss_ldap randomly replying with wrong user\u0027s data",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:nss_ldap-0:253-12.el5.i386",
"5Client:nss_ldap-0:253-12.el5.ia64",
"5Client:nss_ldap-0:253-12.el5.ppc",
"5Client:nss_ldap-0:253-12.el5.ppc64",
"5Client:nss_ldap-0:253-12.el5.s390",
"5Client:nss_ldap-0:253-12.el5.s390x",
"5Client:nss_ldap-0:253-12.el5.src",
"5Client:nss_ldap-0:253-12.el5.x86_64",
"5Client:nss_ldap-debuginfo-0:253-12.el5.i386",
"5Client:nss_ldap-debuginfo-0:253-12.el5.ia64",
"5Client:nss_ldap-debuginfo-0:253-12.el5.ppc",
"5Client:nss_ldap-debuginfo-0:253-12.el5.ppc64",
"5Client:nss_ldap-debuginfo-0:253-12.el5.s390",
"5Client:nss_ldap-debuginfo-0:253-12.el5.s390x",
"5Client:nss_ldap-debuginfo-0:253-12.el5.x86_64",
"5Server:nss_ldap-0:253-12.el5.i386",
"5Server:nss_ldap-0:253-12.el5.ia64",
"5Server:nss_ldap-0:253-12.el5.ppc",
"5Server:nss_ldap-0:253-12.el5.ppc64",
"5Server:nss_ldap-0:253-12.el5.s390",
"5Server:nss_ldap-0:253-12.el5.s390x",
"5Server:nss_ldap-0:253-12.el5.src",
"5Server:nss_ldap-0:253-12.el5.x86_64",
"5Server:nss_ldap-debuginfo-0:253-12.el5.i386",
"5Server:nss_ldap-debuginfo-0:253-12.el5.ia64",
"5Server:nss_ldap-debuginfo-0:253-12.el5.ppc",
"5Server:nss_ldap-debuginfo-0:253-12.el5.ppc64",
"5Server:nss_ldap-debuginfo-0:253-12.el5.s390",
"5Server:nss_ldap-debuginfo-0:253-12.el5.s390x",
"5Server:nss_ldap-debuginfo-0:253-12.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5794"
},
{
"category": "external",
"summary": "RHBZ#367461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=367461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5794",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5794"
}
],
"release_date": "2005-04-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-05-20T14:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:nss_ldap-0:253-12.el5.i386",
"5Client:nss_ldap-0:253-12.el5.ia64",
"5Client:nss_ldap-0:253-12.el5.ppc",
"5Client:nss_ldap-0:253-12.el5.ppc64",
"5Client:nss_ldap-0:253-12.el5.s390",
"5Client:nss_ldap-0:253-12.el5.s390x",
"5Client:nss_ldap-0:253-12.el5.src",
"5Client:nss_ldap-0:253-12.el5.x86_64",
"5Client:nss_ldap-debuginfo-0:253-12.el5.i386",
"5Client:nss_ldap-debuginfo-0:253-12.el5.ia64",
"5Client:nss_ldap-debuginfo-0:253-12.el5.ppc",
"5Client:nss_ldap-debuginfo-0:253-12.el5.ppc64",
"5Client:nss_ldap-debuginfo-0:253-12.el5.s390",
"5Client:nss_ldap-debuginfo-0:253-12.el5.s390x",
"5Client:nss_ldap-debuginfo-0:253-12.el5.x86_64",
"5Server:nss_ldap-0:253-12.el5.i386",
"5Server:nss_ldap-0:253-12.el5.ia64",
"5Server:nss_ldap-0:253-12.el5.ppc",
"5Server:nss_ldap-0:253-12.el5.ppc64",
"5Server:nss_ldap-0:253-12.el5.s390",
"5Server:nss_ldap-0:253-12.el5.s390x",
"5Server:nss_ldap-0:253-12.el5.src",
"5Server:nss_ldap-0:253-12.el5.x86_64",
"5Server:nss_ldap-debuginfo-0:253-12.el5.i386",
"5Server:nss_ldap-debuginfo-0:253-12.el5.ia64",
"5Server:nss_ldap-debuginfo-0:253-12.el5.ppc",
"5Server:nss_ldap-debuginfo-0:253-12.el5.ppc64",
"5Server:nss_ldap-debuginfo-0:253-12.el5.s390",
"5Server:nss_ldap-debuginfo-0:253-12.el5.s390x",
"5Server:nss_ldap-debuginfo-0:253-12.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0389"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nss_ldap randomly replying with wrong user\u0027s data"
}
]
}
fkie_cve-2007-5794
Vulnerability from fkie_nvd
Published
2007-11-13 23:46
Modified
2025-04-09 00:30
Severity ?
Summary
Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
References
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=453868 | ||
| secalert@redhat.com | http://bugs.gentoo.org/show_bug.cgi?id=198390 | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html | ||
| secalert@redhat.com | http://secunia.com/advisories/27670 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/27768 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/27839 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/28061 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/28838 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/29083 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/30352 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/31227 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/31524 | Vendor Advisory | |
| secalert@redhat.com | http://security.gentoo.org/glsa/glsa-200711-33.xml | ||
| secalert@redhat.com | http://support.avaya.com/elmodocs2/security/ASA-2008-332.htm | ||
| secalert@redhat.com | http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0255 | ||
| secalert@redhat.com | http://www.debian.org/security/2007/dsa-1430 | ||
| secalert@redhat.com | http://www.dovecot.org/list/dovecot/2005-April/006859.html | ||
| secalert@redhat.com | http://www.dovecot.org/list/dovecot/2005-March/006345.html | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2008:049 | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2008-0389.html | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2008-0715.html | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/487985/100/0/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/26452 | Patch | |
| secalert@redhat.com | http://www.securitytracker.com/id?1020088 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=154314 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=367461 | ||
| secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/38505 | ||
| secalert@redhat.com | https://issues.rpath.com/browse/RPL-1913 | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10625 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=453868 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://bugs.gentoo.org/show_bug.cgi?id=198390 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27670 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27768 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27839 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28061 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28838 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29083 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30352 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31227 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31524 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200711-33.xml | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.avaya.com/elmodocs2/security/ASA-2008-332.htm | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0255 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2007/dsa-1430 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.dovecot.org/list/dovecot/2005-April/006859.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.dovecot.org/list/dovecot/2005-March/006345.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2008:049 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0389.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0715.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/487985/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/26452 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020088 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=154314 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=367461 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/38505 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://issues.rpath.com/browse/RPL-1913 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10625 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nss_ldap:nss_ldap:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6A6B086B-F03D-4B3B-BE8C-60CDAB1955C2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected."
},
{
"lang": "es",
"value": "Una condici\u00f3n de carrera en nss_ldap, cuando es usado en aplicaciones que est\u00e1n enlazadas contra la biblioteca y bifurcaci\u00f3n de pthread despu\u00e9s de una llamada a nss_ldap, puede enviar datos de usuario al proceso incorrecto debido al manejo inapropiado de la conexi\u00f3n LDAP. NOTA: este problema fue reportado originalmente por Dovecot con los buzones equivocados siendo devueltos, pero otras aplicaciones tambi\u00e9n podr\u00edan estar afectadas."
}
],
"id": "CVE-2007-5794",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-11-13T23:46:00.000",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=453868"
},
{
"source": "secalert@redhat.com",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=198390"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27670"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27768"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27839"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28061"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28838"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29083"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30352"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31227"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31524"
},
{
"source": "secalert@redhat.com",
"url": "http://security.gentoo.org/glsa/glsa-200711-33.xml"
},
{
"source": "secalert@redhat.com",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-332.htm"
},
{
"source": "secalert@redhat.com",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0255"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2007/dsa-1430"
},
{
"source": "secalert@redhat.com",
"url": "http://www.dovecot.org/list/dovecot/2005-April/006859.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.dovecot.org/list/dovecot/2005-March/006345.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:049"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0389.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0715.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/487985/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/26452"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securitytracker.com/id?1020088"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=154314"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=367461"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38505"
},
{
"source": "secalert@redhat.com",
"url": "https://issues.rpath.com/browse/RPL-1913"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10625"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=453868"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=198390"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27670"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27768"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27839"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28061"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28838"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29083"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30352"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31227"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31524"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200711-33.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-332.htm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0255"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2007/dsa-1430"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.dovecot.org/list/dovecot/2005-April/006859.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.dovecot.org/list/dovecot/2005-March/006345.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:049"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0389.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0715.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/487985/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/26452"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1020088"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=154314"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=367461"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38505"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://issues.rpath.com/browse/RPL-1913"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10625"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-362"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
gsd-2007-5794
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2007-5794",
"description": "Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.",
"id": "GSD-2007-5794",
"references": [
"https://www.suse.com/security/cve/CVE-2007-5794.html",
"https://www.debian.org/security/2007/dsa-1430",
"https://access.redhat.com/errata/RHSA-2008:0715",
"https://access.redhat.com/errata/RHSA-2008:0389",
"https://linux.oracle.com/cve/CVE-2007-5794.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2007-5794"
],
"details": "Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.",
"id": "GSD-2007-5794",
"modified": "2023-12-13T01:21:40.360073Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-5794",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=453868",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=453868"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=198390",
"refsource": "MISC",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=198390"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
},
{
"name": "http://secunia.com/advisories/27670",
"refsource": "MISC",
"url": "http://secunia.com/advisories/27670"
},
{
"name": "http://secunia.com/advisories/27768",
"refsource": "MISC",
"url": "http://secunia.com/advisories/27768"
},
{
"name": "http://secunia.com/advisories/27839",
"refsource": "MISC",
"url": "http://secunia.com/advisories/27839"
},
{
"name": "http://secunia.com/advisories/28061",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28061"
},
{
"name": "http://secunia.com/advisories/28838",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28838"
},
{
"name": "http://secunia.com/advisories/29083",
"refsource": "MISC",
"url": "http://secunia.com/advisories/29083"
},
{
"name": "http://secunia.com/advisories/30352",
"refsource": "MISC",
"url": "http://secunia.com/advisories/30352"
},
{
"name": "http://secunia.com/advisories/31227",
"refsource": "MISC",
"url": "http://secunia.com/advisories/31227"
},
{
"name": "http://secunia.com/advisories/31524",
"refsource": "MISC",
"url": "http://secunia.com/advisories/31524"
},
{
"name": "http://security.gentoo.org/glsa/glsa-200711-33.xml",
"refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-200711-33.xml"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-332.htm",
"refsource": "MISC",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-332.htm"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0255",
"refsource": "MISC",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0255"
},
{
"name": "http://www.debian.org/security/2007/dsa-1430",
"refsource": "MISC",
"url": "http://www.debian.org/security/2007/dsa-1430"
},
{
"name": "http://www.dovecot.org/list/dovecot/2005-April/006859.html",
"refsource": "MISC",
"url": "http://www.dovecot.org/list/dovecot/2005-April/006859.html"
},
{
"name": "http://www.dovecot.org/list/dovecot/2005-March/006345.html",
"refsource": "MISC",
"url": "http://www.dovecot.org/list/dovecot/2005-March/006345.html"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:049",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:049"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2008-0389.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0389.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2008-0715.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0715.html"
},
{
"name": "http://www.securityfocus.com/archive/1/487985/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/487985/100/0/threaded"
},
{
"name": "http://www.securityfocus.com/bid/26452",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/26452"
},
{
"name": "http://www.securitytracker.com/id?1020088",
"refsource": "MISC",
"url": "http://www.securitytracker.com/id?1020088"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=154314",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=154314"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38505",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38505"
},
{
"name": "https://issues.rpath.com/browse/RPL-1913",
"refsource": "MISC",
"url": "https://issues.rpath.com/browse/RPL-1913"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10625",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10625"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=367461",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=367461"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:nss_ldap:nss_ldap:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-5794"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=154314",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=154314"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=367461",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=367461"
},
{
"name": "[Dovecot] 20050303 hanging imap... and users getting other users\u0027 emails!",
"refsource": "MLIST",
"tags": [],
"url": "http://www.dovecot.org/list/dovecot/2005-March/006345.html"
},
{
"name": "[Dovecot] 20050409 Authentication and the wrong mailbox?",
"refsource": "MLIST",
"tags": [],
"url": "http://www.dovecot.org/list/dovecot/2005-April/006859.html"
},
{
"name": "https://issues.rpath.com/browse/RPL-1913",
"refsource": "CONFIRM",
"tags": [],
"url": "https://issues.rpath.com/browse/RPL-1913"
},
{
"name": "GLSA-200711-33",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-200711-33.xml"
},
{
"name": "26452",
"refsource": "BID",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/26452"
},
{
"name": "27670",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27670"
},
{
"name": "27768",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27768"
},
{
"name": "27839",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27839"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=453868",
"refsource": "CONFIRM",
"tags": [],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=453868"
},
{
"name": "DSA-1430",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2007/dsa-1430"
},
{
"name": "28061",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28061"
},
{
"name": "SUSE-SR:2008:003",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
},
{
"name": "28838",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28838"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0255",
"refsource": "CONFIRM",
"tags": [],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0255"
},
{
"name": "MDVSA-2008:049",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:049"
},
{
"name": "29083",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29083"
},
{
"name": "RHSA-2008:0389",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0389.html"
},
{
"name": "30352",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30352"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-332.htm",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-332.htm"
},
{
"name": "31524",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31524"
},
{
"name": "RHSA-2008:0715",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0715.html"
},
{
"name": "31227",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31227"
},
{
"name": "1020088",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1020088"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=198390",
"refsource": "CONFIRM",
"tags": [],
"url": "http://bugs.gentoo.org/show_bug.cgi?id=198390"
},
{
"name": "nssldap-ldap-race-condition(38505)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38505"
},
{
"name": "oval:org.mitre.oval:def:10625",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10625"
},
{
"name": "20080212 FLEA-2008-0003-1 nss_ldap",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/487985/100/0/threaded"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-10-15T21:46Z",
"publishedDate": "2007-11-13T23:46Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…