Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-14905 (GCVE-0-2025-14905)
Vulnerability from cvelistv5 – Published: 2026-02-23 15:41 – Updated: 2026-02-25 20:05
VLAI?
EPSS
Title
389-ds-base: 389-ds-base: remote code execution and denial of service via heap buffer overflow
Summary
A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
Severity ?
7.2 (High)
CWE
- CWE-122 - Heap-based Buffer Overflow
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux 10 |
Unaffected:
0:3.1.3-7.el10_1 , < *
(rpm)
cpe:/o:redhat:enterprise_linux:10.1 |
||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||
Credits
This issue was discovered by Red Hat Security Research Team (Red Hat Inc.).
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-14905",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-23T18:49:43.028074Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-23T18:54:27.128Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10.1"
],
"defaultStatus": "affected",
"packageName": "389-ds-base",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:3.1.3-7.el10_1",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::appstream"
],
"defaultStatus": "affected",
"packageName": "389-ds-base",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.7.0-10.el9_7",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:directory_server:13.1::el10"
],
"defaultStatus": "affected",
"packageName": "dirsrv/dirsrv-container-rhel10",
"product": "Red Hat Directory Server 13.1",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:directory_server:11"
],
"defaultStatus": "affected",
"packageName": "redhat-ds:11/389-ds-base",
"product": "Red Hat Directory Server 11",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:directory_server:12"
],
"defaultStatus": "affected",
"packageName": "redhat-ds:12/389-ds-base",
"product": "Red Hat Directory Server 12",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:directory_server:13"
],
"defaultStatus": "affected",
"packageName": "389-ds-base",
"product": "Red Hat Directory Server 13",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:6"
],
"defaultStatus": "unknown",
"packageName": "389-ds-base",
"product": "Red Hat Enterprise Linux 6",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:7"
],
"defaultStatus": "affected",
"packageName": "389-ds-base",
"product": "Red Hat Enterprise Linux 7",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8"
],
"defaultStatus": "affected",
"packageName": "389-ds:1.4/389-ds-base",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat"
}
],
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Red Hat Security Research Team (Red Hat Inc.)."
}
],
"datePublic": "2026-02-23T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE)."
}
],
"metrics": [
{
"other": {
"content": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"value": "Moderate"
},
"type": "Red Hat severity rating"
}
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-122",
"description": "Heap-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-25T20:05:16.364Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2026:3189",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:3189"
},
{
"name": "RHSA-2026:3208",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:3208"
},
{
"name": "RHSA-2026:3379",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:3379"
},
{
"tags": [
"vdb-entry",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"name": "RHBZ#2423624",
"tags": [
"issue-tracking",
"x_refsource_REDHAT"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-12-18T18:04:56.621Z",
"value": "Reported to Red Hat."
},
{
"lang": "en",
"time": "2026-02-23T00:00:00.000Z",
"value": "Made public."
}
],
"title": "389-ds-base: 389-ds-base: remote code execution and denial of service via heap buffer overflow",
"workarounds": [
{
"lang": "en",
"value": "Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow."
}
],
"x_generator": {
"engine": "cvelib 1.8.0"
},
"x_redhatCweChain": "CWE-122: Heap-based Buffer Overflow"
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2025-14905",
"datePublished": "2026-02-23T15:41:47.976Z",
"dateReserved": "2025-12-18T18:06:35.400Z",
"dateUpdated": "2026-02-25T20:05:16.364Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-14905\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2026-02-23T16:29:35.620\",\"lastModified\":\"2026-02-25T21:16:30.623\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 un defecto en el servidor 389-ds-base. Existe una vulnerabilidad de desbordamiento de b\u00fafer de mont\u00edculo en la funci\u00f3n \u0027schema_attr_enum_callback\u0027 dentro del archivo \u0027schema.c\u0027. Esto ocurre porque el c\u00f3digo calcula incorrectamente el tama\u00f1o del b\u00fafer al sumar las longitudes de las cadenas de alias sin tener en cuenta los caracteres de formato adicionales. Cuando se procesa un gran n\u00famero de alias, este descuido puede conducir a un desbordamiento de mont\u00edculo, lo que podr\u00eda permitir a un atacante remoto causar una denegaci\u00f3n de servicio (DoS) o lograr ejecuci\u00f3n remota de c\u00f3digo (RCE).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-122\"}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2026:3189\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:3208\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:3379\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2025-14905\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2423624\",\"source\":\"secalert@redhat.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-14905\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-02-23T18:49:43.028074Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-02-23T18:54:18.796Z\"}}], \"cna\": {\"title\": \"389-ds-base: 389-ds-base: remote code execution and denial of service via heap buffer overflow\", \"credits\": [{\"lang\": \"en\", \"value\": \"This issue was discovered by Red Hat Security Research Team (Red Hat Inc.).\"}], \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Moderate\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.2, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10.1\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:3.1.3-7.el10_1\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"389-ds-base\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::crb\", \"cpe:/a:redhat:enterprise_linux:9::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.7.0-10.el9_7\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"389-ds-base\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:directory_server:11\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Directory Server 11\", \"packageName\": \"redhat-ds:11/389-ds-base\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:directory_server:12\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Directory Server 12\", \"packageName\": \"redhat-ds:12/389-ds-base\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:directory_server:13\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Directory Server 13\", \"packageName\": \"389-ds-base\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 6\", \"packageName\": \"389-ds-base\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:7\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7\", \"packageName\": \"389-ds-base\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"packageName\": \"389-ds:1.4/389-ds-base\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-12-18T18:04:56.621Z\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2026-02-23T00:00:00.000Z\", \"value\": \"Made public.\"}], \"datePublic\": \"2026-02-23T00:00:00.000Z\", \"references\": [{\"url\": \"https://access.redhat.com/errata/RHSA-2026:3189\", \"name\": \"RHSA-2026:3189\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:3208\", \"name\": \"RHSA-2026:3208\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2025-14905\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2423624\", \"name\": \"RHBZ#2423624\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.\"}], \"x_generator\": {\"engine\": \"cvelib 1.8.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-122\", \"description\": \"Heap-based Buffer Overflow\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2026-02-24T23:15:52.207Z\"}, \"x_redhatCweChain\": \"CWE-122: Heap-based Buffer Overflow\"}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-14905\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-02-24T23:15:52.207Z\", \"dateReserved\": \"2025-12-18T18:06:35.400Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2026-02-23T15:41:47.976Z\", \"assignerShortName\": \"redhat\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
RHSA-2026:3379
Vulnerability from csaf_redhat - Published: 2026-02-25 20:03 - Updated: 2026-02-25 20:05Summary
Red Hat Security Advisory: Red Hat Directory Server 13.1 container image available as a Technology Preview
Notes
Topic
Red Hat Directory Server 13.1 container images for RHEL 10 are now available as a Technology Preview in the Red Hat container registry.
Details
Red Hat Directory Server is an LDAPv3-compliant directory server. The image is maintained by Red Hat and updated regularly.
To pull this container image, run the following command: podman pull registry.redhat.io/dirsrv/dirsrv-container-rhel10:13.1
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Directory Server 13.1 container images for RHEL 10 are now available as a Technology Preview in the Red Hat container registry.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Directory Server is an LDAPv3-compliant directory server. The image is maintained by Red Hat and updated regularly.\nTo pull this container image, run the following command: podman pull registry.redhat.io/dirsrv/dirsrv-container-rhel10:13.1",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3379",
"url": "https://access.redhat.com/errata/RHSA-2026:3379"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-14905",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/support/offerings/techpreview",
"url": "https://access.redhat.com/support/offerings/techpreview"
},
{
"category": "external",
"summary": "https://catalog.redhat.com/software/containers/search",
"url": "https://catalog.redhat.com/software/containers/search"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_directory_server/13/html/red_hat_directory_server_13_release_notes/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_directory_server/13/html/red_hat_directory_server_13_release_notes/index"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3379.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Directory Server 13.1 container image available as a Technology Preview",
"tracking": {
"current_release_date": "2026-02-25T20:05:11+00:00",
"generator": {
"date": "2026-02-25T20:05:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:3379",
"initial_release_date": "2026-02-25T20:03:51+00:00",
"revision_history": [
{
"date": "2026-02-25T20:03:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-25T20:04:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-25T20:05:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Directory Server 13.1",
"product": {
"name": "Red Hat Directory Server 13.1",
"product_id": "Red Hat Directory Server 13.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:directory_server:13.1::el10"
}
}
}
],
"category": "product_family",
"name": "Red Hat Directory Server"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/dirsrv/dirsrv-container-rhel10@sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5_amd64",
"product": {
"name": "registry.redhat.io/dirsrv/dirsrv-container-rhel10@sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5_amd64",
"product_id": "registry.redhat.io/dirsrv/dirsrv-container-rhel10@sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/dirsrv-container-rhel10@sha256%3A5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5?arch=amd64\u0026repository_url=registry.redhat.io/dirsrv\u0026tag=1772040913"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/dirsrv/dirsrv-container-rhel10@sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5_amd64 as a component of Red Hat Directory Server 13.1",
"product_id": "Red Hat Directory Server 13.1:registry.redhat.io/dirsrv/dirsrv-container-rhel10@sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5_amd64"
},
"product_reference": "registry.redhat.io/dirsrv/dirsrv-container-rhel10@sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5_amd64",
"relates_to_product_reference": "Red Hat Directory Server 13.1"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-14905",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-12-18T18:04:56.621000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423624"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Directory Server. A heap buffer overflow in the `389-ds-base` component can lead to a denial of service or potential remote code execution. Exploitation requires high privileges on the Directory Server, limiting the attack surface to authenticated administrative users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Directory Server 13.1:registry.redhat.io/dirsrv/dirsrv-container-rhel10@sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "RHBZ#2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905"
}
],
"release_date": "2026-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T20:03:51+00:00",
"details": "The container image provided by this update can be downloaded from the Red Hat container registry at registry.redhat.io using the \"podman pull\" command. For more information about the image, search the \u003cimage_name\u003e in the Red Hat Ecosystem Catalog: https://catalog.redhat.com/software/containers/search",
"product_ids": [
"Red Hat Directory Server 13.1:registry.redhat.io/dirsrv/dirsrv-container-rhel10@sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3379"
},
{
"category": "workaround",
"details": "Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.",
"product_ids": [
"Red Hat Directory Server 13.1:registry.redhat.io/dirsrv/dirsrv-container-rhel10@sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Directory Server 13.1:registry.redhat.io/dirsrv/dirsrv-container-rhel10@sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow"
}
]
}
RHSA-2026:3208
Vulnerability from csaf_redhat - Published: 2026-02-24 13:53 - Updated: 2026-02-25 20:05Summary
Red Hat Security Advisory: 389-ds-base security update
Notes
Topic
An update for 389-ds-base is now available for Red Hat Enterprise Linux 10.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.
Security Fix(es):
* 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for 389-ds-base is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.\n\nSecurity Fix(es):\n\n* 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3208",
"url": "https://access.redhat.com/errata/RHSA-2026:3208"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3208.json"
}
],
"title": "Red Hat Security Advisory: 389-ds-base security update",
"tracking": {
"current_release_date": "2026-02-25T20:05:11+00:00",
"generator": {
"date": "2026-02-25T20:05:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:3208",
"initial_release_date": "2026-02-24T13:53:17+00:00",
"revision_history": [
{
"date": "2026-02-24T13:53:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-24T13:53:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-25T20:05:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:3.1.3-7.el10_1.src",
"product": {
"name": "389-ds-base-0:3.1.3-7.el10_1.src",
"product_id": "389-ds-base-0:3.1.3-7.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@3.1.3-7.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:3.1.3-7.el10_1.aarch64",
"product": {
"name": "389-ds-base-0:3.1.3-7.el10_1.aarch64",
"product_id": "389-ds-base-0:3.1.3-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@3.1.3-7.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"product": {
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"product_id": "389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@3.1.3-7.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"product": {
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"product_id": "389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@3.1.3-7.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"product": {
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"product_id": "389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@3.1.3-7.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"product": {
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"product_id": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-bdb-debuginfo@3.1.3-7.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"product": {
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"product_id": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@3.1.3-7.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"product": {
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"product_id": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@3.1.3-7.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"product_id": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@3.1.3-7.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"product": {
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"product_id": "389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-bdb@3.1.3-7.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"product": {
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"product_id": "389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@3.1.3-7.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"product": {
"name": "389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"product_id": "389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@3.1.3-7.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"product": {
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"product_id": "389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@3.1.3-7.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"product": {
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"product_id": "389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@3.1.3-7.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"product": {
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"product_id": "389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@3.1.3-7.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"product": {
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"product_id": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-bdb-debuginfo@3.1.3-7.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"product": {
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"product_id": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@3.1.3-7.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"product": {
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"product_id": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@3.1.3-7.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"product_id": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@3.1.3-7.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"product": {
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"product_id": "389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-bdb@3.1.3-7.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"product": {
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"product_id": "389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@3.1.3-7.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:3.1.3-7.el10_1.x86_64",
"product": {
"name": "389-ds-base-0:3.1.3-7.el10_1.x86_64",
"product_id": "389-ds-base-0:3.1.3-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@3.1.3-7.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"product": {
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"product_id": "389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@3.1.3-7.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"product": {
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"product_id": "389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@3.1.3-7.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"product": {
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"product_id": "389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@3.1.3-7.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"product": {
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"product_id": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-bdb-debuginfo@3.1.3-7.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"product": {
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"product_id": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@3.1.3-7.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"product": {
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"product_id": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@3.1.3-7.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"product_id": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@3.1.3-7.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"product": {
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"product_id": "389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-bdb@3.1.3-7.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"product": {
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"product_id": "389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@3.1.3-7.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:3.1.3-7.el10_1.s390x",
"product": {
"name": "389-ds-base-0:3.1.3-7.el10_1.s390x",
"product_id": "389-ds-base-0:3.1.3-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@3.1.3-7.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"product": {
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"product_id": "389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@3.1.3-7.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"product": {
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"product_id": "389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@3.1.3-7.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"product": {
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"product_id": "389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@3.1.3-7.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"product": {
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"product_id": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-bdb-debuginfo@3.1.3-7.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"product": {
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"product_id": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@3.1.3-7.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"product": {
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"product_id": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@3.1.3-7.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"product_id": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@3.1.3-7.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"product": {
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"product_id": "389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-bdb@3.1.3-7.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"product": {
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"product_id": "389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@3.1.3-7.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-lib389-0:3.1.3-7.el10_1.noarch",
"product": {
"name": "python3-lib389-0:3.1.3-7.el10_1.noarch",
"product_id": "python3-lib389-0:3.1.3-7.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-lib389@3.1.3-7.el10_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.1.3-7.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.src"
},
"product_reference": "389-ds-base-0:3.1.3-7.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:3.1.3-7.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-lib389-0:3.1.3-7.el10_1.noarch"
},
"product_reference": "python3-lib389-0:3.1.3-7.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.1.3-7.el10_1.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.src"
},
"product_reference": "389-ds-base-0:3.1.3-7.el10_1.src",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:3.1.3-7.el10_1.noarch as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:python3-lib389-0:3.1.3-7.el10_1.noarch"
},
"product_reference": "python3-lib389-0:3.1.3-7.el10_1.noarch",
"relates_to_product_reference": "CRB-10.1.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-14905",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-12-18T18:04:56.621000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423624"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Directory Server. A heap buffer overflow in the `389-ds-base` component can lead to a denial of service or potential remote code execution. Exploitation requires high privileges on the Directory Server, limiting the attack surface to authenticated administrative users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.src",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:python3-lib389-0:3.1.3-7.el10_1.noarch",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.src",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:python3-lib389-0:3.1.3-7.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "RHBZ#2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905"
}
],
"release_date": "2026-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T13:53:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.src",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:python3-lib389-0:3.1.3-7.el10_1.noarch",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.src",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:python3-lib389-0:3.1.3-7.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3208"
},
{
"category": "workaround",
"details": "Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.",
"product_ids": [
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.src",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:python3-lib389-0:3.1.3-7.el10_1.noarch",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.src",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:python3-lib389-0:3.1.3-7.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.src",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:python3-lib389-0:3.1.3-7.el10_1.noarch",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.src",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:python3-lib389-0:3.1.3-7.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow"
}
]
}
RHSA-2026:3189
Vulnerability from csaf_redhat - Published: 2026-02-24 11:44 - Updated: 2026-02-25 20:05Summary
Red Hat Security Advisory: 389-ds-base security update
Notes
Topic
An update for 389-ds-base is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.
Security Fix(es):
* 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for 389-ds-base is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.\n\nSecurity Fix(es):\n\n* 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3189",
"url": "https://access.redhat.com/errata/RHSA-2026:3189"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3189.json"
}
],
"title": "Red Hat Security Advisory: 389-ds-base security update",
"tracking": {
"current_release_date": "2026-02-25T20:05:11+00:00",
"generator": {
"date": "2026-02-25T20:05:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:3189",
"initial_release_date": "2026-02-24T11:44:57+00:00",
"revision_history": [
{
"date": "2026-02-24T11:44:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-24T11:44:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-25T20:05:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.7.0-10.el9_7.src",
"product": {
"name": "389-ds-base-0:2.7.0-10.el9_7.src",
"product_id": "389-ds-base-0:2.7.0-10.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.7.0-10.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.7.0-10.el9_7.aarch64",
"product": {
"name": "389-ds-base-0:2.7.0-10.el9_7.aarch64",
"product_id": "389-ds-base-0:2.7.0-10.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.7.0-10.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"product": {
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"product_id": "389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.7.0-10.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"product": {
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"product_id": "389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@2.7.0-10.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"product": {
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"product_id": "389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.7.0-10.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"product": {
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"product_id": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.7.0-10.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"product_id": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.7.0-10.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"product_id": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.7.0-10.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"product": {
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"product_id": "389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@2.7.0-10.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"product": {
"name": "389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"product_id": "389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.7.0-10.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"product": {
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"product_id": "389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.7.0-10.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"product": {
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"product_id": "389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@2.7.0-10.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"product": {
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"product_id": "389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.7.0-10.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"product": {
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"product_id": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.7.0-10.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"product_id": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.7.0-10.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"product_id": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.7.0-10.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"product": {
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"product_id": "389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@2.7.0-10.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.7.0-10.el9_7.x86_64",
"product": {
"name": "389-ds-base-0:2.7.0-10.el9_7.x86_64",
"product_id": "389-ds-base-0:2.7.0-10.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.7.0-10.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"product": {
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"product_id": "389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.7.0-10.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"product": {
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"product_id": "389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@2.7.0-10.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"product": {
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"product_id": "389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.7.0-10.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"product": {
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"product_id": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.7.0-10.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"product_id": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.7.0-10.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"product_id": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.7.0-10.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"product": {
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"product_id": "389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@2.7.0-10.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.7.0-10.el9_7.s390x",
"product": {
"name": "389-ds-base-0:2.7.0-10.el9_7.s390x",
"product_id": "389-ds-base-0:2.7.0-10.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.7.0-10.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"product": {
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"product_id": "389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.7.0-10.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"product": {
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"product_id": "389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@2.7.0-10.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"product": {
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"product_id": "389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.7.0-10.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"product": {
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"product_id": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.7.0-10.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"product_id": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.7.0-10.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"product_id": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.7.0-10.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"product": {
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"product_id": "389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@2.7.0-10.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-lib389-0:2.7.0-10.el9_7.noarch",
"product": {
"name": "python3-lib389-0:2.7.0-10.el9_7.noarch",
"product_id": "python3-lib389-0:2.7.0-10.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-lib389@2.7.0-10.el9_7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.7.0-10.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.src"
},
"product_reference": "389-ds-base-0:2.7.0-10.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:2.7.0-10.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:python3-lib389-0:2.7.0-10.el9_7.noarch"
},
"product_reference": "python3-lib389-0:2.7.0-10.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.7.0-10.el9_7.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.src"
},
"product_reference": "389-ds-base-0:2.7.0-10.el9_7.src",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:2.7.0-10.el9_7.noarch as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:python3-lib389-0:2.7.0-10.el9_7.noarch"
},
"product_reference": "python3-lib389-0:2.7.0-10.el9_7.noarch",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-14905",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-12-18T18:04:56.621000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423624"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Directory Server. A heap buffer overflow in the `389-ds-base` component can lead to a denial of service or potential remote code execution. Exploitation requires high privileges on the Directory Server, limiting the attack surface to authenticated administrative users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.src",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-lib389-0:2.7.0-10.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.src",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:python3-lib389-0:2.7.0-10.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "RHBZ#2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905"
}
],
"release_date": "2026-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T11:44:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.src",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-lib389-0:2.7.0-10.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.src",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:python3-lib389-0:2.7.0-10.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3189"
},
{
"category": "workaround",
"details": "Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.src",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-lib389-0:2.7.0-10.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.src",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:python3-lib389-0:2.7.0-10.el9_7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.src",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-lib389-0:2.7.0-10.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.src",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:python3-lib389-0:2.7.0-10.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow"
}
]
}
FKIE_CVE-2025-14905
Vulnerability from fkie_nvd - Published: 2026-02-23 16:29 - Updated: 2026-02-25 21:16
Severity ?
Summary
A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE)."
},
{
"lang": "es",
"value": "Se encontr\u00f3 un defecto en el servidor 389-ds-base. Existe una vulnerabilidad de desbordamiento de b\u00fafer de mont\u00edculo en la funci\u00f3n \u0027schema_attr_enum_callback\u0027 dentro del archivo \u0027schema.c\u0027. Esto ocurre porque el c\u00f3digo calcula incorrectamente el tama\u00f1o del b\u00fafer al sumar las longitudes de las cadenas de alias sin tener en cuenta los caracteres de formato adicionales. Cuando se procesa un gran n\u00famero de alias, este descuido puede conducir a un desbordamiento de mont\u00edculo, lo que podr\u00eda permitir a un atacante remoto causar una denegaci\u00f3n de servicio (DoS) o lograr ejecuci\u00f3n remota de c\u00f3digo (RCE)."
}
],
"id": "CVE-2025-14905",
"lastModified": "2026-02-25T21:16:30.623",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
},
"published": "2026-02-23T16:29:35.620",
"references": [
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:3189"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:3208"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:3379"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-122"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
}
GHSA-Q4HC-VP2M-FR47
Vulnerability from github – Published: 2026-02-23 18:32 – Updated: 2026-02-25 21:31
VLAI?
Details
A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the schema_attr_enum_callback function within the schema.c file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
Severity ?
7.2 (High)
{
"affected": [],
"aliases": [
"CVE-2025-14905"
],
"database_specific": {
"cwe_ids": [
"CWE-122"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-02-23T16:29:35Z",
"severity": "HIGH"
},
"details": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"id": "GHSA-q4hc-vp2m-fr47",
"modified": "2026-02-25T21:31:17Z",
"published": "2026-02-23T18:32:02Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:3189"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:3208"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:3379"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…