Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-14905 (GCVE-0-2025-14905)
Vulnerability from cvelistv5 – Published: 2026-02-23 15:41 – Updated: 2026-03-31 15:40- CWE-122 - Heap-based Buffer Overflow
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Red Hat | Red Hat Directory Server 11.5 E4S for RHEL 8 |
Unaffected:
8060020260303152239.0ca98e7e , < *
(rpm)
cpe:/a:redhat:directory_server_e4s:11.5::el8 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-14905",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-23T18:49:43.028074Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-23T18:54:27.128Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:directory_server_e4s:11.5::el8"
],
"defaultStatus": "affected",
"packageName": "redhat-ds:11",
"product": "Red Hat Directory Server 11.5 E4S for RHEL 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "8060020260303152239.0ca98e7e",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:directory_server_e4s:11.7::el8"
],
"defaultStatus": "affected",
"packageName": "redhat-ds:11",
"product": "Red Hat Directory Server 11.7 E4S for RHEL 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "8080020260227193008.f969626e",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:directory_server:11.9::el8"
],
"defaultStatus": "affected",
"packageName": "redhat-ds:11",
"product": "Red Hat Directory Server 11.9 for RHEL 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "8100020260312105752.37ed7c03",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:directory_server_e4s:12.2::el9"
],
"defaultStatus": "affected",
"packageName": "redhat-ds:12",
"product": "Red Hat Directory Server 12.2 E4S for RHEL 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "9020020260304180546.1674d574",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:directory_server_eus:12.4::el9"
],
"defaultStatus": "affected",
"packageName": "redhat-ds:12",
"product": "Red Hat Directory Server 12.4 EUS for RHEL 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "9040020260225135630.1674d574",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10.1"
],
"defaultStatus": "affected",
"packageName": "389-ds-base",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:3.1.3-7.el10_1",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux_eus:10.0"
],
"defaultStatus": "affected",
"packageName": "389-ds-base",
"product": "Red Hat Enterprise Linux 10.0 Extended Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:3.0.6-17.el10_0",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:rhel_els:7"
],
"defaultStatus": "affected",
"packageName": "389-ds-base",
"product": "Red Hat Enterprise Linux 7 Extended Lifecycle Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.3.11.1-11.el7_9",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:8::appstream"
],
"defaultStatus": "affected",
"packageName": "389-ds:1.4",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "8100020260312103235.25e700aa",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
],
"defaultStatus": "affected",
"packageName": "389-ds:1.4",
"product": "Red Hat Enterprise Linux 8.2 Advanced Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "8020020260303204738.dbc46ba7",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream",
"cpe:/a:redhat:rhel_aus:8.4::appstream"
],
"defaultStatus": "affected",
"packageName": "389-ds:1.4",
"product": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "8040020260303172348.96015a92",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream",
"cpe:/a:redhat:rhel_aus:8.4::appstream"
],
"defaultStatus": "affected",
"packageName": "389-ds:1.4",
"product": "Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "8040020260303172348.96015a92",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream"
],
"defaultStatus": "affected",
"packageName": "389-ds:1.4",
"product": "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "8060020260303144613.824efc52",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream"
],
"defaultStatus": "affected",
"packageName": "389-ds:1.4",
"product": "Red Hat Enterprise Linux 8.6 Telecommunications Update Service",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "8060020260303144613.824efc52",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream"
],
"defaultStatus": "affected",
"packageName": "389-ds:1.4",
"product": "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "8060020260303144613.824efc52",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_e4s:8.8::appstream",
"cpe:/a:redhat:rhel_tus:8.8::appstream"
],
"defaultStatus": "affected",
"packageName": "389-ds:1.4",
"product": "Red Hat Enterprise Linux 8.8 Telecommunications Update Service",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "8080020260227183930.6dbb3803",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_e4s:8.8::appstream",
"cpe:/a:redhat:rhel_tus:8.8::appstream"
],
"defaultStatus": "affected",
"packageName": "389-ds:1.4",
"product": "Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "8080020260227183930.6dbb3803",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
],
"defaultStatus": "affected",
"packageName": "389-ds-base",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.7.0-10.el9_7",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
],
"defaultStatus": "affected",
"packageName": "389-ds-base",
"product": "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.0.14-5.el9_0",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_e4s:9.2::appstream"
],
"defaultStatus": "affected",
"packageName": "389-ds-base",
"product": "Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.2.4-17.el9_2",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:rhel_eus:9.4::crb"
],
"defaultStatus": "affected",
"packageName": "389-ds-base",
"product": "Red Hat Enterprise Linux 9.4 Extended Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.4.5-24.el9_4",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_eus:9.6::crb",
"cpe:/a:redhat:rhel_eus:9.6::appstream"
],
"defaultStatus": "affected",
"packageName": "389-ds-base",
"product": "Red Hat Enterprise Linux 9.6 Extended Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.6.1-20.el9_6",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:directory_server:13.1::el10"
],
"defaultStatus": "affected",
"packageName": "dirsrv/dirsrv-container-rhel10",
"product": "Red Hat Directory Server 13.1",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:directory_server:12"
],
"defaultStatus": "affected",
"packageName": "redhat-ds:12/389-ds-base",
"product": "Red Hat Directory Server 12",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:directory_server:13"
],
"defaultStatus": "affected",
"packageName": "389-ds-base",
"product": "Red Hat Directory Server 13",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:6"
],
"defaultStatus": "unknown",
"packageName": "389-ds-base",
"product": "Red Hat Enterprise Linux 6",
"vendor": "Red Hat"
}
],
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Red Hat Security Research Team (Red Hat Inc.)."
}
],
"datePublic": "2026-02-23T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE)."
}
],
"metrics": [
{
"other": {
"content": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"value": "Moderate"
},
"type": "Red Hat severity rating"
}
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-122",
"description": "Heap-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-31T15:40:05.143Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2026:3189",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:3189"
},
{
"name": "RHSA-2026:3208",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:3208"
},
{
"name": "RHSA-2026:3379",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:3379"
},
{
"name": "RHSA-2026:3504",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:3504"
},
{
"name": "RHSA-2026:4207",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:4207"
},
{
"name": "RHSA-2026:4661",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:4661"
},
{
"name": "RHSA-2026:4720",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:4720"
},
{
"name": "RHSA-2026:5196",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:5196"
},
{
"name": "RHSA-2026:5511",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:5511"
},
{
"name": "RHSA-2026:5512",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:5512"
},
{
"name": "RHSA-2026:5513",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:5513"
},
{
"name": "RHSA-2026:5514",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:5514"
},
{
"name": "RHSA-2026:5568",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:5568"
},
{
"name": "RHSA-2026:5569",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:5569"
},
{
"name": "RHSA-2026:5576",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:5576"
},
{
"name": "RHSA-2026:5597",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:5597"
},
{
"name": "RHSA-2026:5598",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:5598"
},
{
"name": "RHSA-2026:6220",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:6220"
},
{
"name": "RHSA-2026:6268",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:6268"
},
{
"tags": [
"vdb-entry",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"name": "RHBZ#2423624",
"tags": [
"issue-tracking",
"x_refsource_REDHAT"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-12-18T18:04:56.621Z",
"value": "Reported to Red Hat."
},
{
"lang": "en",
"time": "2026-02-23T00:00:00.000Z",
"value": "Made public."
}
],
"title": "389-ds-base: 389-ds-base: remote code execution and denial of service via heap buffer overflow",
"workarounds": [
{
"lang": "en",
"value": "Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow."
}
],
"x_generator": {
"engine": "cvelib 1.8.0"
},
"x_redhatCweChain": "CWE-122: Heap-based Buffer Overflow"
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2025-14905",
"datePublished": "2026-02-23T15:41:47.976Z",
"dateReserved": "2025-12-18T18:06:35.400Z",
"dateUpdated": "2026-03-31T15:40:05.143Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-14905\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2026-02-23T16:29:35.620\",\"lastModified\":\"2026-03-31T16:16:27.923\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 un defecto en el servidor 389-ds-base. Existe una vulnerabilidad de desbordamiento de b\u00fafer de mont\u00edculo en la funci\u00f3n \u0027schema_attr_enum_callback\u0027 dentro del archivo \u0027schema.c\u0027. Esto ocurre porque el c\u00f3digo calcula incorrectamente el tama\u00f1o del b\u00fafer al sumar las longitudes de las cadenas de alias sin tener en cuenta los caracteres de formato adicionales. Cuando se procesa un gran n\u00famero de alias, este descuido puede conducir a un desbordamiento de mont\u00edculo, lo que podr\u00eda permitir a un atacante remoto causar una denegaci\u00f3n de servicio (DoS) o lograr ejecuci\u00f3n remota de c\u00f3digo (RCE).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-122\"}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2026:3189\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:3208\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:3379\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:3504\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:4207\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:4661\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:4720\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:5196\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:5511\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:5512\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:5513\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:5514\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:5568\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:5569\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:5576\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:5597\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:5598\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:6220\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:6268\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2025-14905\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2423624\",\"source\":\"secalert@redhat.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-14905\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-02-23T18:49:43.028074Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-02-23T18:54:18.796Z\"}}], \"cna\": {\"title\": \"389-ds-base: 389-ds-base: remote code execution and denial of service via heap buffer overflow\", \"credits\": [{\"lang\": \"en\", \"value\": \"This issue was discovered by Red Hat Security Research Team (Red Hat Inc.).\"}], \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Moderate\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.2, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"cpes\": [\"cpe:/a:redhat:directory_server_e4s:11.5::el8\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Directory Server 11.5 E4S for RHEL 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"8060020260303152239.0ca98e7e\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"redhat-ds:11\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:directory_server_e4s:11.7::el8\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Directory Server 11.7 E4S for RHEL 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"8080020260227193008.f969626e\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"redhat-ds:11\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:directory_server:11.9::el8\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Directory Server 11.9 for RHEL 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"8100020260312105752.37ed7c03\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"redhat-ds:11\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:directory_server_e4s:12.2::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Directory Server 12.2 E4S for RHEL 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"9020020260304180546.1674d574\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"redhat-ds:12\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:directory_server_eus:12.4::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Directory Server 12.4 EUS for RHEL 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"9040020260225135630.1674d574\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"redhat-ds:12\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10.1\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:3.1.3-7.el10_1\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"389-ds-base\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux_eus:10.0\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10.0 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:3.0.6-17.el10_0\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"389-ds-base\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_els:7\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7 Extended Lifecycle Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.3.11.1-11.el7_9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"389-ds-base\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:8::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"8100020260312103235.25e700aa\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"389-ds:1.4\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_aus:8.2::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.2 Advanced Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"8020020260303204738.dbc46ba7\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"389-ds:1.4\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream\", \"cpe:/a:redhat:rhel_aus:8.4::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"8040020260303172348.96015a92\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"389-ds:1.4\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream\", \"cpe:/a:redhat:rhel_aus:8.4::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"8040020260303172348.96015a92\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"389-ds:1.4\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_tus:8.6::appstream\", \"cpe:/a:redhat:rhel_aus:8.6::appstream\", \"cpe:/a:redhat:rhel_e4s:8.6::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"8060020260303144613.824efc52\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"389-ds:1.4\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_tus:8.6::appstream\", \"cpe:/a:redhat:rhel_aus:8.6::appstream\", \"cpe:/a:redhat:rhel_e4s:8.6::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.6 Telecommunications Update Service\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"8060020260303144613.824efc52\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"389-ds:1.4\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_tus:8.6::appstream\", \"cpe:/a:redhat:rhel_aus:8.6::appstream\", \"cpe:/a:redhat:rhel_e4s:8.6::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"8060020260303144613.824efc52\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"389-ds:1.4\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_e4s:8.8::appstream\", \"cpe:/a:redhat:rhel_tus:8.8::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.8 Telecommunications Update Service\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"8080020260227183930.6dbb3803\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"389-ds:1.4\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_e4s:8.8::appstream\", \"cpe:/a:redhat:rhel_tus:8.8::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"8080020260227183930.6dbb3803\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"389-ds:1.4\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::appstream\", \"cpe:/a:redhat:enterprise_linux:9::crb\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.7.0-10.el9_7\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"389-ds-base\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_e4s:9.0::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.0.14-5.el9_0\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"389-ds-base\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_e4s:9.2::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.2.4-17.el9_2\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"389-ds-base\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_eus:9.4::appstream\", \"cpe:/a:redhat:rhel_eus:9.4::crb\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.4 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.4.5-24.el9_4\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"389-ds-base\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_eus:9.6::crb\", \"cpe:/a:redhat:rhel_eus:9.6::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.6 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.6.1-20.el9_6\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"389-ds-base\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:directory_server:13.1::el10\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Directory Server 13.1\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"dirsrv/dirsrv-container-rhel10\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:directory_server:12\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Directory Server 12\", \"packageName\": \"redhat-ds:12/389-ds-base\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:directory_server:13\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Directory Server 13\", \"packageName\": \"389-ds-base\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 6\", \"packageName\": \"389-ds-base\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-12-18T18:04:56.621Z\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2026-02-23T00:00:00.000Z\", \"value\": \"Made public.\"}], \"datePublic\": \"2026-02-23T00:00:00.000Z\", \"references\": [{\"url\": \"https://access.redhat.com/errata/RHSA-2026:3189\", \"name\": \"RHSA-2026:3189\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:3208\", \"name\": \"RHSA-2026:3208\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:3379\", \"name\": \"RHSA-2026:3379\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:3504\", \"name\": \"RHSA-2026:3504\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:4207\", \"name\": \"RHSA-2026:4207\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:4661\", \"name\": \"RHSA-2026:4661\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:4720\", \"name\": \"RHSA-2026:4720\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:5196\", \"name\": \"RHSA-2026:5196\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:5511\", \"name\": \"RHSA-2026:5511\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:5512\", \"name\": \"RHSA-2026:5512\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:5513\", \"name\": \"RHSA-2026:5513\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:5514\", \"name\": \"RHSA-2026:5514\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:5568\", \"name\": \"RHSA-2026:5568\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:5569\", \"name\": \"RHSA-2026:5569\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:5576\", \"name\": \"RHSA-2026:5576\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:5597\", \"name\": \"RHSA-2026:5597\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:5598\", \"name\": \"RHSA-2026:5598\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:6220\", \"name\": \"RHSA-2026:6220\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:6268\", \"name\": \"RHSA-2026:6268\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2025-14905\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2423624\", \"name\": \"RHBZ#2423624\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.\"}], \"x_generator\": {\"engine\": \"cvelib 1.8.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-122\", \"description\": \"Heap-based Buffer Overflow\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2026-03-31T15:40:05.143Z\"}, \"x_redhatCweChain\": \"CWE-122: Heap-based Buffer Overflow\"}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-14905\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-31T15:40:05.143Z\", \"dateReserved\": \"2025-12-18T18:06:35.400Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2026-02-23T15:41:47.976Z\", \"assignerShortName\": \"redhat\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
RHSA-2026:5513
Vulnerability from csaf_redhat - Published: 2026-03-24 00:56 - Updated: 2026-03-31 17:31A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the 389-ds:1.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. \n\nSecurity Fix(es):\n\n* 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:5513",
"url": "https://access.redhat.com/errata/RHSA-2026:5513"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_5513.json"
}
],
"title": "Red Hat Security Advisory: 389-ds:1.4 security update",
"tracking": {
"current_release_date": "2026-03-31T17:31:23+00:00",
"generator": {
"date": "2026-03-31T17:31:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:5513",
"initial_release_date": "2026-03-24T00:56:25+00:00",
"revision_history": [
{
"date": "2026-03-24T00:56:25+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-24T00:56:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-31T17:31:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.src::389-ds:1.4",
"product": {
"name": "389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.src (389-ds:1.4)",
"product_id": "389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.src::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=src\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-lib389-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.noarch::389-ds:1.4",
"product": {
"name": "python3-lib389-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.noarch (389-ds:1.4)",
"product_id": "python3-lib389-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.noarch::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-lib389@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=noarch\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"product": {
"name": "389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64 (389-ds:1.4)",
"product_id": "389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=aarch64\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"product": {
"name": "389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64 (389-ds:1.4)",
"product_id": "389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=aarch64\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"product": {
"name": "389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64 (389-ds:1.4)",
"product_id": "389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=aarch64\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"product": {
"name": "389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64 (389-ds:1.4)",
"product_id": "389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=aarch64\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"product": {
"name": "389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64 (389-ds:1.4)",
"product_id": "389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=aarch64\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"product": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64 (389-ds:1.4)",
"product_id": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools-debuginfo@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=aarch64\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"product": {
"name": "389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64 (389-ds:1.4)",
"product_id": "389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=aarch64\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"product": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64 (389-ds:1.4)",
"product_id": "389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=aarch64\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"product": {
"name": "389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64 (389-ds:1.4)",
"product_id": "389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=aarch64\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64 (389-ds:1.4)",
"product_id": "389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=aarch64\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=ppc64le\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=ppc64le\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=ppc64le\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=ppc64le\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=ppc64le\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools-debuginfo@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=ppc64le\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=ppc64le\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=ppc64le\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=ppc64le\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=ppc64le\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"product": {
"name": "389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x (389-ds:1.4)",
"product_id": "389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=s390x\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"product": {
"name": "389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x (389-ds:1.4)",
"product_id": "389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=s390x\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"product": {
"name": "389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x (389-ds:1.4)",
"product_id": "389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=s390x\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"product": {
"name": "389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x (389-ds:1.4)",
"product_id": "389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=s390x\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"product": {
"name": "389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x (389-ds:1.4)",
"product_id": "389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=s390x\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"product": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x (389-ds:1.4)",
"product_id": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools-debuginfo@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=s390x\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"product": {
"name": "389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x (389-ds:1.4)",
"product_id": "389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=s390x\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"product": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x (389-ds:1.4)",
"product_id": "389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=s390x\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"product": {
"name": "389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x (389-ds:1.4)",
"product_id": "389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=s390x\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x (389-ds:1.4)",
"product_id": "389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=s390x\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=x86_64\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=x86_64\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=x86_64\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=x86_64\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=x86_64\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools-debuginfo@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=x86_64\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=x86_64\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=x86_64\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=x86_64\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@1.4.3.39-23.module%2Bel8.10.0%2B24085%2Bb368a310?arch=x86_64\u0026rpmmod=389-ds:1.4:8100020260312103235:25e700aa"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4"
},
"product_reference": "389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4"
},
"product_reference": "389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.src (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.src::389-ds:1.4"
},
"product_reference": "389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.src::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4"
},
"product_reference": "389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4"
},
"product_reference": "389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4"
},
"product_reference": "389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4"
},
"product_reference": "389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4"
},
"product_reference": "389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4"
},
"product_reference": "389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.noarch (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-lib389-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.noarch::389-ds:1.4"
},
"product_reference": "python3-lib389-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.noarch::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-14905",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-12-18T18:04:56.621000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423624"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Directory Server. A heap buffer overflow in the `389-ds-base` component can lead to a denial of service or potential remote code execution. Exploitation requires high privileges on the Directory Server, limiting the attack surface to authenticated administrative users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.src::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:python3-lib389-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.noarch::389-ds:1.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "RHBZ#2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905"
}
],
"release_date": "2026-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T00:56:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.src::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:python3-lib389-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.noarch::389-ds:1.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5513"
},
{
"category": "workaround",
"details": "Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.src::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:python3-lib389-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.noarch::389-ds:1.4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.src::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-debugsource-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-devel-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-libs-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.aarch64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.ppc64le::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.s390x::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:389-ds-base-snmp-debuginfo-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.x86_64::389-ds:1.4",
"AppStream-8.10.0.Z.MAIN.EUS:python3-lib389-0:1.4.3.39-23.module+el8.10.0+24085+b368a310.noarch::389-ds:1.4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow"
}
]
}
RHSA-2026:6268
Vulnerability from csaf_redhat - Published: 2026-03-31 15:37 - Updated: 2026-03-31 17:31A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the 389-ds:1.4 module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support and Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. \n\nSecurity Fix(es):\n\n* 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:6268",
"url": "https://access.redhat.com/errata/RHSA-2026:6268"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_6268.json"
}
],
"title": "Red Hat Security Advisory: 389-ds:1.4 security update",
"tracking": {
"current_release_date": "2026-03-31T17:31:28+00:00",
"generator": {
"date": "2026-03-31T17:31:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:6268",
"initial_release_date": "2026-03-31T15:37:55+00:00",
"revision_history": [
{
"date": "2026-03-31T15:37:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-31T15:37:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-31T17:31:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.src::389-ds:1.4",
"product": {
"name": "389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.src (389-ds:1.4)",
"product_id": "389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.src::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.4.3.34-3.module%2Bel8.4.0%2B24054%2B665bc8dc?arch=src\u0026rpmmod=389-ds:1.4:8040020260303172348:96015a92"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.4.3.34-3.module%2Bel8.4.0%2B24054%2B665bc8dc?arch=x86_64\u0026rpmmod=389-ds:1.4:8040020260303172348:96015a92"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@1.4.3.34-3.module%2Bel8.4.0%2B24054%2B665bc8dc?arch=x86_64\u0026rpmmod=389-ds:1.4:8040020260303172348:96015a92"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-debugsource-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-debugsource-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@1.4.3.34-3.module%2Bel8.4.0%2B24054%2B665bc8dc?arch=x86_64\u0026rpmmod=389-ds:1.4:8040020260303172348:96015a92"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-devel-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-devel-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@1.4.3.34-3.module%2Bel8.4.0%2B24054%2B665bc8dc?arch=x86_64\u0026rpmmod=389-ds:1.4:8040020260303172348:96015a92"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-legacy-tools-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-legacy-tools-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools@1.4.3.34-3.module%2Bel8.4.0%2B24054%2B665bc8dc?arch=x86_64\u0026rpmmod=389-ds:1.4:8040020260303172348:96015a92"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools-debuginfo@1.4.3.34-3.module%2Bel8.4.0%2B24054%2B665bc8dc?arch=x86_64\u0026rpmmod=389-ds:1.4:8040020260303172348:96015a92"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-libs-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-libs-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@1.4.3.34-3.module%2Bel8.4.0%2B24054%2B665bc8dc?arch=x86_64\u0026rpmmod=389-ds:1.4:8040020260303172348:96015a92"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-libs-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@1.4.3.34-3.module%2Bel8.4.0%2B24054%2B665bc8dc?arch=x86_64\u0026rpmmod=389-ds:1.4:8040020260303172348:96015a92"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-snmp-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-snmp-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@1.4.3.34-3.module%2Bel8.4.0%2B24054%2B665bc8dc?arch=x86_64\u0026rpmmod=389-ds:1.4:8040020260303172348:96015a92"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-snmp-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@1.4.3.34-3.module%2Bel8.4.0%2B24054%2B665bc8dc?arch=x86_64\u0026rpmmod=389-ds:1.4:8040020260303172348:96015a92"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-lib389-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.noarch::389-ds:1.4",
"product": {
"name": "python3-lib389-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.noarch (389-ds:1.4)",
"product_id": "python3-lib389-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.noarch::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-lib389@1.4.3.34-3.module%2Bel8.4.0%2B24054%2B665bc8dc?arch=noarch\u0026rpmmod=389-ds:1.4:8040020260303172348:96015a92"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.src (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.src::389-ds:1.4"
},
"product_reference": "389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.src::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:389-ds-base-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:389-ds-base-debugsource-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-debugsource-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:389-ds-base-devel-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-devel-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:389-ds-base-legacy-tools-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:389-ds-base-libs-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:389-ds-base-libs-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:389-ds-base-snmp-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:389-ds-base-snmp-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.noarch (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python3-lib389-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.noarch::389-ds:1.4"
},
"product_reference": "python3-lib389-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.noarch::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.src (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.src::389-ds:1.4"
},
"product_reference": "389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.src::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-debugsource-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-debugsource-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-devel-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-devel-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-legacy-tools-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-libs-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-libs-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-snmp-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-snmp-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.noarch (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:python3-lib389-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.noarch::389-ds:1.4"
},
"product_reference": "python3-lib389-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.noarch::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-14905",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-12-18T18:04:56.621000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423624"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Directory Server. A heap buffer overflow in the `389-ds-base` component can lead to a denial of service or potential remote code execution. Exploitation requires high privileges on the Directory Server, limiting the attack surface to authenticated administrative users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.src::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-debugsource-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-devel-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-legacy-tools-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-libs-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-libs-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-snmp-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-snmp-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:python3-lib389-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.noarch::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.src::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-debugsource-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-devel-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-legacy-tools-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-libs-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-libs-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-snmp-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-snmp-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-lib389-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.noarch::389-ds:1.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "RHBZ#2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905"
}
],
"release_date": "2026-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-31T15:37:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.src::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-debugsource-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-devel-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-legacy-tools-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-libs-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-libs-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-snmp-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-snmp-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:python3-lib389-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.noarch::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.src::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-debugsource-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-devel-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-legacy-tools-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-libs-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-libs-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-snmp-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-snmp-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-lib389-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.noarch::389-ds:1.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6268"
},
{
"category": "workaround",
"details": "Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.src::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-debugsource-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-devel-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-legacy-tools-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-libs-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-libs-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-snmp-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-snmp-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:python3-lib389-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.noarch::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.src::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-debugsource-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-devel-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-legacy-tools-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-libs-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-libs-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-snmp-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-snmp-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-lib389-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.noarch::389-ds:1.4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.src::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-debugsource-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-devel-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-legacy-tools-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-libs-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-libs-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-snmp-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:389-ds-base-snmp-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.AUS:python3-lib389-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.noarch::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.src::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-debugsource-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-devel-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-legacy-tools-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-libs-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-libs-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-snmp-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:389-ds-base-snmp-debuginfo-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.x86_64::389-ds:1.4",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-lib389-0:1.4.3.34-3.module+el8.4.0+24054+665bc8dc.noarch::389-ds:1.4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow"
}
]
}
RHSA-2026:6220
Vulnerability from csaf_redhat - Published: 2026-03-31 00:30 - Updated: 2026-03-31 17:31A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for 389-ds-base is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.\n\nSecurity Fix(es):\n\n* 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:6220",
"url": "https://access.redhat.com/errata/RHSA-2026:6220"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_6220.json"
}
],
"title": "Red Hat Security Advisory: 389-ds-base security update",
"tracking": {
"current_release_date": "2026-03-31T17:31:35+00:00",
"generator": {
"date": "2026-03-31T17:31:35+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:6220",
"initial_release_date": "2026-03-31T00:30:42+00:00",
"revision_history": [
{
"date": "2026-03-31T00:30:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-31T00:30:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-31T17:31:35+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.3.11.1-11.el7_9.src",
"product": {
"name": "389-ds-base-0:1.3.11.1-11.el7_9.src",
"product_id": "389-ds-base-0:1.3.11.1-11.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.3.11.1-11.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.3.11.1-11.el7_9.x86_64",
"product": {
"name": "389-ds-base-0:1.3.11.1-11.el7_9.x86_64",
"product_id": "389-ds-base-0:1.3.11.1-11.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.3.11.1-11.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:1.3.11.1-11.el7_9.x86_64",
"product": {
"name": "389-ds-base-libs-0:1.3.11.1-11.el7_9.x86_64",
"product_id": "389-ds-base-libs-0:1.3.11.1-11.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@1.3.11.1-11.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.x86_64",
"product": {
"name": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.x86_64",
"product_id": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@1.3.11.1-11.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:1.3.11.1-11.el7_9.x86_64",
"product": {
"name": "389-ds-base-devel-0:1.3.11.1-11.el7_9.x86_64",
"product_id": "389-ds-base-devel-0:1.3.11.1-11.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@1.3.11.1-11.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.x86_64",
"product": {
"name": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.x86_64",
"product_id": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@1.3.11.1-11.el7_9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.3.11.1-11.el7_9.ppc64le",
"product": {
"name": "389-ds-base-0:1.3.11.1-11.el7_9.ppc64le",
"product_id": "389-ds-base-0:1.3.11.1-11.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.3.11.1-11.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64le",
"product": {
"name": "389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64le",
"product_id": "389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@1.3.11.1-11.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64le",
"product": {
"name": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64le",
"product_id": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@1.3.11.1-11.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64le",
"product": {
"name": "389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64le",
"product_id": "389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@1.3.11.1-11.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64le",
"product": {
"name": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64le",
"product_id": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@1.3.11.1-11.el7_9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.3.11.1-11.el7_9.ppc64",
"product": {
"name": "389-ds-base-0:1.3.11.1-11.el7_9.ppc64",
"product_id": "389-ds-base-0:1.3.11.1-11.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.3.11.1-11.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64",
"product": {
"name": "389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64",
"product_id": "389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@1.3.11.1-11.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64",
"product": {
"name": "389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64",
"product_id": "389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@1.3.11.1-11.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64",
"product": {
"name": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64",
"product_id": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@1.3.11.1-11.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64",
"product": {
"name": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64",
"product_id": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@1.3.11.1-11.el7_9?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.3.11.1-11.el7_9.s390x",
"product": {
"name": "389-ds-base-0:1.3.11.1-11.el7_9.s390x",
"product_id": "389-ds-base-0:1.3.11.1-11.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.3.11.1-11.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:1.3.11.1-11.el7_9.s390x",
"product": {
"name": "389-ds-base-devel-0:1.3.11.1-11.el7_9.s390x",
"product_id": "389-ds-base-devel-0:1.3.11.1-11.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@1.3.11.1-11.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:1.3.11.1-11.el7_9.s390x",
"product": {
"name": "389-ds-base-libs-0:1.3.11.1-11.el7_9.s390x",
"product_id": "389-ds-base-libs-0:1.3.11.1-11.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@1.3.11.1-11.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.s390x",
"product": {
"name": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.s390x",
"product_id": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@1.3.11.1-11.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.s390x",
"product": {
"name": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.s390x",
"product_id": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@1.3.11.1-11.el7_9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.3.11.1-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:389-ds-base-0:1.3.11.1-11.el7_9.ppc64"
},
"product_reference": "389-ds-base-0:1.3.11.1-11.el7_9.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.3.11.1-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:389-ds-base-0:1.3.11.1-11.el7_9.ppc64le"
},
"product_reference": "389-ds-base-0:1.3.11.1-11.el7_9.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.3.11.1-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:389-ds-base-0:1.3.11.1-11.el7_9.s390x"
},
"product_reference": "389-ds-base-0:1.3.11.1-11.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.3.11.1-11.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:389-ds-base-0:1.3.11.1-11.el7_9.src"
},
"product_reference": "389-ds-base-0:1.3.11.1-11.el7_9.src",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.3.11.1-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:389-ds-base-0:1.3.11.1-11.el7_9.x86_64"
},
"product_reference": "389-ds-base-0:1.3.11.1-11.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64"
},
"product_reference": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64le"
},
"product_reference": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.s390x"
},
"product_reference": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.x86_64"
},
"product_reference": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64"
},
"product_reference": "389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64le"
},
"product_reference": "389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.3.11.1-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.s390x"
},
"product_reference": "389-ds-base-devel-0:1.3.11.1-11.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.3.11.1-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.x86_64"
},
"product_reference": "389-ds-base-devel-0:1.3.11.1-11.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64"
},
"product_reference": "389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64le"
},
"product_reference": "389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.3.11.1-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.s390x"
},
"product_reference": "389-ds-base-libs-0:1.3.11.1-11.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.3.11.1-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.x86_64"
},
"product_reference": "389-ds-base-libs-0:1.3.11.1-11.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64"
},
"product_reference": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64le"
},
"product_reference": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.s390x"
},
"product_reference": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.x86_64"
},
"product_reference": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.3.11.1-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:389-ds-base-0:1.3.11.1-11.el7_9.ppc64"
},
"product_reference": "389-ds-base-0:1.3.11.1-11.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.3.11.1-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:389-ds-base-0:1.3.11.1-11.el7_9.ppc64le"
},
"product_reference": "389-ds-base-0:1.3.11.1-11.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.3.11.1-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:389-ds-base-0:1.3.11.1-11.el7_9.s390x"
},
"product_reference": "389-ds-base-0:1.3.11.1-11.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.3.11.1-11.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:389-ds-base-0:1.3.11.1-11.el7_9.src"
},
"product_reference": "389-ds-base-0:1.3.11.1-11.el7_9.src",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.3.11.1-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:389-ds-base-0:1.3.11.1-11.el7_9.x86_64"
},
"product_reference": "389-ds-base-0:1.3.11.1-11.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64"
},
"product_reference": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64le"
},
"product_reference": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.s390x"
},
"product_reference": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.x86_64"
},
"product_reference": "389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64"
},
"product_reference": "389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64le"
},
"product_reference": "389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.3.11.1-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.s390x"
},
"product_reference": "389-ds-base-devel-0:1.3.11.1-11.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.3.11.1-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.x86_64"
},
"product_reference": "389-ds-base-devel-0:1.3.11.1-11.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64"
},
"product_reference": "389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64le"
},
"product_reference": "389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.3.11.1-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.s390x"
},
"product_reference": "389-ds-base-libs-0:1.3.11.1-11.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.3.11.1-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.x86_64"
},
"product_reference": "389-ds-base-libs-0:1.3.11.1-11.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64"
},
"product_reference": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64le"
},
"product_reference": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.s390x"
},
"product_reference": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.x86_64"
},
"product_reference": "389-ds-base-snmp-0:1.3.11.1-11.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-14905",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-12-18T18:04:56.621000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423624"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Directory Server. A heap buffer overflow in the `389-ds-base` component can lead to a denial of service or potential remote code execution. Exploitation requires high privileges on the Directory Server, limiting the attack surface to authenticated administrative users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:389-ds-base-0:1.3.11.1-11.el7_9.ppc64",
"7Server-ELS:389-ds-base-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-ELS:389-ds-base-0:1.3.11.1-11.el7_9.s390x",
"7Server-ELS:389-ds-base-0:1.3.11.1-11.el7_9.src",
"7Server-ELS:389-ds-base-0:1.3.11.1-11.el7_9.x86_64",
"7Server-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64",
"7Server-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.s390x",
"7Server-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.x86_64",
"7Server-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64",
"7Server-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.s390x",
"7Server-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.x86_64",
"7Server-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64",
"7Server-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.s390x",
"7Server-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.x86_64",
"7Server-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64",
"7Server-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.s390x",
"7Server-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.x86_64",
"7Server-optional-ELS:389-ds-base-0:1.3.11.1-11.el7_9.ppc64",
"7Server-optional-ELS:389-ds-base-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-optional-ELS:389-ds-base-0:1.3.11.1-11.el7_9.s390x",
"7Server-optional-ELS:389-ds-base-0:1.3.11.1-11.el7_9.src",
"7Server-optional-ELS:389-ds-base-0:1.3.11.1-11.el7_9.x86_64",
"7Server-optional-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64",
"7Server-optional-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-optional-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.s390x",
"7Server-optional-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.x86_64",
"7Server-optional-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64",
"7Server-optional-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-optional-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.s390x",
"7Server-optional-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.x86_64",
"7Server-optional-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64",
"7Server-optional-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-optional-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.s390x",
"7Server-optional-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.x86_64",
"7Server-optional-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64",
"7Server-optional-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-optional-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.s390x",
"7Server-optional-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "RHBZ#2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905"
}
],
"release_date": "2026-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-31T00:30:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:389-ds-base-0:1.3.11.1-11.el7_9.ppc64",
"7Server-ELS:389-ds-base-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-ELS:389-ds-base-0:1.3.11.1-11.el7_9.s390x",
"7Server-ELS:389-ds-base-0:1.3.11.1-11.el7_9.src",
"7Server-ELS:389-ds-base-0:1.3.11.1-11.el7_9.x86_64",
"7Server-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64",
"7Server-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.s390x",
"7Server-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.x86_64",
"7Server-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64",
"7Server-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.s390x",
"7Server-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.x86_64",
"7Server-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64",
"7Server-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.s390x",
"7Server-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.x86_64",
"7Server-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64",
"7Server-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.s390x",
"7Server-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.x86_64",
"7Server-optional-ELS:389-ds-base-0:1.3.11.1-11.el7_9.ppc64",
"7Server-optional-ELS:389-ds-base-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-optional-ELS:389-ds-base-0:1.3.11.1-11.el7_9.s390x",
"7Server-optional-ELS:389-ds-base-0:1.3.11.1-11.el7_9.src",
"7Server-optional-ELS:389-ds-base-0:1.3.11.1-11.el7_9.x86_64",
"7Server-optional-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64",
"7Server-optional-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-optional-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.s390x",
"7Server-optional-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.x86_64",
"7Server-optional-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64",
"7Server-optional-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-optional-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.s390x",
"7Server-optional-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.x86_64",
"7Server-optional-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64",
"7Server-optional-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-optional-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.s390x",
"7Server-optional-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.x86_64",
"7Server-optional-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64",
"7Server-optional-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-optional-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.s390x",
"7Server-optional-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6220"
},
{
"category": "workaround",
"details": "Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.",
"product_ids": [
"7Server-ELS:389-ds-base-0:1.3.11.1-11.el7_9.ppc64",
"7Server-ELS:389-ds-base-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-ELS:389-ds-base-0:1.3.11.1-11.el7_9.s390x",
"7Server-ELS:389-ds-base-0:1.3.11.1-11.el7_9.src",
"7Server-ELS:389-ds-base-0:1.3.11.1-11.el7_9.x86_64",
"7Server-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64",
"7Server-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.s390x",
"7Server-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.x86_64",
"7Server-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64",
"7Server-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.s390x",
"7Server-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.x86_64",
"7Server-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64",
"7Server-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.s390x",
"7Server-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.x86_64",
"7Server-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64",
"7Server-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.s390x",
"7Server-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.x86_64",
"7Server-optional-ELS:389-ds-base-0:1.3.11.1-11.el7_9.ppc64",
"7Server-optional-ELS:389-ds-base-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-optional-ELS:389-ds-base-0:1.3.11.1-11.el7_9.s390x",
"7Server-optional-ELS:389-ds-base-0:1.3.11.1-11.el7_9.src",
"7Server-optional-ELS:389-ds-base-0:1.3.11.1-11.el7_9.x86_64",
"7Server-optional-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64",
"7Server-optional-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-optional-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.s390x",
"7Server-optional-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.x86_64",
"7Server-optional-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64",
"7Server-optional-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-optional-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.s390x",
"7Server-optional-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.x86_64",
"7Server-optional-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64",
"7Server-optional-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-optional-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.s390x",
"7Server-optional-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.x86_64",
"7Server-optional-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64",
"7Server-optional-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-optional-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.s390x",
"7Server-optional-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:389-ds-base-0:1.3.11.1-11.el7_9.ppc64",
"7Server-ELS:389-ds-base-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-ELS:389-ds-base-0:1.3.11.1-11.el7_9.s390x",
"7Server-ELS:389-ds-base-0:1.3.11.1-11.el7_9.src",
"7Server-ELS:389-ds-base-0:1.3.11.1-11.el7_9.x86_64",
"7Server-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64",
"7Server-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.s390x",
"7Server-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.x86_64",
"7Server-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64",
"7Server-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.s390x",
"7Server-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.x86_64",
"7Server-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64",
"7Server-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.s390x",
"7Server-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.x86_64",
"7Server-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64",
"7Server-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.s390x",
"7Server-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.x86_64",
"7Server-optional-ELS:389-ds-base-0:1.3.11.1-11.el7_9.ppc64",
"7Server-optional-ELS:389-ds-base-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-optional-ELS:389-ds-base-0:1.3.11.1-11.el7_9.s390x",
"7Server-optional-ELS:389-ds-base-0:1.3.11.1-11.el7_9.src",
"7Server-optional-ELS:389-ds-base-0:1.3.11.1-11.el7_9.x86_64",
"7Server-optional-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64",
"7Server-optional-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-optional-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.s390x",
"7Server-optional-ELS:389-ds-base-debuginfo-0:1.3.11.1-11.el7_9.x86_64",
"7Server-optional-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64",
"7Server-optional-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-optional-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.s390x",
"7Server-optional-ELS:389-ds-base-devel-0:1.3.11.1-11.el7_9.x86_64",
"7Server-optional-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64",
"7Server-optional-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-optional-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.s390x",
"7Server-optional-ELS:389-ds-base-libs-0:1.3.11.1-11.el7_9.x86_64",
"7Server-optional-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64",
"7Server-optional-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.ppc64le",
"7Server-optional-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.s390x",
"7Server-optional-ELS:389-ds-base-snmp-0:1.3.11.1-11.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow"
}
]
}
RHSA-2026:3189
Vulnerability from csaf_redhat - Published: 2026-02-24 11:44 - Updated: 2026-03-31 17:24A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for 389-ds-base is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.\n\nSecurity Fix(es):\n\n* 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3189",
"url": "https://access.redhat.com/errata/RHSA-2026:3189"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3189.json"
}
],
"title": "Red Hat Security Advisory: 389-ds-base security update",
"tracking": {
"current_release_date": "2026-03-31T17:24:13+00:00",
"generator": {
"date": "2026-03-31T17:24:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:3189",
"initial_release_date": "2026-02-24T11:44:57+00:00",
"revision_history": [
{
"date": "2026-02-24T11:44:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-24T11:44:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-31T17:24:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.7.0-10.el9_7.src",
"product": {
"name": "389-ds-base-0:2.7.0-10.el9_7.src",
"product_id": "389-ds-base-0:2.7.0-10.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.7.0-10.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.7.0-10.el9_7.aarch64",
"product": {
"name": "389-ds-base-0:2.7.0-10.el9_7.aarch64",
"product_id": "389-ds-base-0:2.7.0-10.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.7.0-10.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"product": {
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"product_id": "389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.7.0-10.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"product": {
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"product_id": "389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@2.7.0-10.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"product": {
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"product_id": "389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.7.0-10.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"product": {
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"product_id": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.7.0-10.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"product_id": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.7.0-10.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"product_id": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.7.0-10.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"product": {
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"product_id": "389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@2.7.0-10.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"product": {
"name": "389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"product_id": "389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.7.0-10.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"product": {
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"product_id": "389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.7.0-10.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"product": {
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"product_id": "389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@2.7.0-10.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"product": {
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"product_id": "389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.7.0-10.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"product": {
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"product_id": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.7.0-10.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"product_id": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.7.0-10.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"product_id": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.7.0-10.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"product": {
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"product_id": "389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@2.7.0-10.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.7.0-10.el9_7.x86_64",
"product": {
"name": "389-ds-base-0:2.7.0-10.el9_7.x86_64",
"product_id": "389-ds-base-0:2.7.0-10.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.7.0-10.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"product": {
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"product_id": "389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.7.0-10.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"product": {
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"product_id": "389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@2.7.0-10.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"product": {
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"product_id": "389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.7.0-10.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"product": {
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"product_id": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.7.0-10.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"product_id": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.7.0-10.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"product_id": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.7.0-10.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"product": {
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"product_id": "389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@2.7.0-10.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.7.0-10.el9_7.s390x",
"product": {
"name": "389-ds-base-0:2.7.0-10.el9_7.s390x",
"product_id": "389-ds-base-0:2.7.0-10.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.7.0-10.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"product": {
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"product_id": "389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.7.0-10.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"product": {
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"product_id": "389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@2.7.0-10.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"product": {
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"product_id": "389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.7.0-10.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"product": {
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"product_id": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.7.0-10.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"product_id": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.7.0-10.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"product_id": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.7.0-10.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"product": {
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"product_id": "389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@2.7.0-10.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-lib389-0:2.7.0-10.el9_7.noarch",
"product": {
"name": "python3-lib389-0:2.7.0-10.el9_7.noarch",
"product_id": "python3-lib389-0:2.7.0-10.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-lib389@2.7.0-10.el9_7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.7.0-10.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.src"
},
"product_reference": "389-ds-base-0:2.7.0-10.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:2.7.0-10.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:python3-lib389-0:2.7.0-10.el9_7.noarch"
},
"product_reference": "python3-lib389-0:2.7.0-10.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.7.0-10.el9_7.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.src"
},
"product_reference": "389-ds-base-0:2.7.0-10.el9_7.src",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:2.7.0-10.el9_7.noarch as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:python3-lib389-0:2.7.0-10.el9_7.noarch"
},
"product_reference": "python3-lib389-0:2.7.0-10.el9_7.noarch",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-14905",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-12-18T18:04:56.621000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423624"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Directory Server. A heap buffer overflow in the `389-ds-base` component can lead to a denial of service or potential remote code execution. Exploitation requires high privileges on the Directory Server, limiting the attack surface to authenticated administrative users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.src",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-lib389-0:2.7.0-10.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.src",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:python3-lib389-0:2.7.0-10.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "RHBZ#2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905"
}
],
"release_date": "2026-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T11:44:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.src",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-lib389-0:2.7.0-10.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.src",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:python3-lib389-0:2.7.0-10.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3189"
},
{
"category": "workaround",
"details": "Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.src",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-lib389-0:2.7.0-10.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.src",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:python3-lib389-0:2.7.0-10.el9_7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.src",
"AppStream-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-lib389-0:2.7.0-10.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.src",
"CRB-9.7.0.Z.MAIN:389-ds-base-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-debuginfo-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-debugsource-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-devel-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-libs-debuginfo-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:389-ds-base-snmp-debuginfo-0:2.7.0-10.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:python3-lib389-0:2.7.0-10.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow"
}
]
}
RHSA-2026:5514
Vulnerability from csaf_redhat - Published: 2026-03-24 00:17 - Updated: 2026-03-31 17:31A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the redhat-ds:11 module is now available for Red Hat Directory Server 11.9 for RHEL 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Directory Server is an LDAPv3-compliant directory server. The suite of packages includes the Lightweight Directory Access Protocol (LDAP) server, as well as command-line utilities and Web UI packages for server administration.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Directory Server 11.9 for RHEL 8 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:5514",
"url": "https://access.redhat.com/errata/RHSA-2026:5514"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_directory_server/11/html/release_notes/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_directory_server/11/html/release_notes/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_5514.json"
}
],
"title": "Red Hat Security Advisory: redhat-ds:11 security update",
"tracking": {
"current_release_date": "2026-03-31T17:31:24+00:00",
"generator": {
"date": "2026-03-31T17:31:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:5514",
"initial_release_date": "2026-03-24T00:17:35+00:00",
"revision_history": [
{
"date": "2026-03-24T00:17:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-24T00:17:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-31T17:31:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Directory Server 11.9 for RHEL 8",
"product": {
"name": "Red Hat Directory Server 11.9 for RHEL 8",
"product_id": "8Base-DirSrv-11.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:directory_server:11.9::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Directory Server"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.src::redhat-ds:11",
"product": {
"name": "389-ds-base-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.src (redhat-ds:11)",
"product_id": "389-ds-base-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.src::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.4.3.39-21.module%2Bel8dsrv%2B24083%2Bd25fcbb4?arch=src\u0026rpmmod=redhat-ds:11:8100020260312105752:37ed7c03"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.4.3.39-21.module%2Bel8dsrv%2B24083%2Bd25fcbb4?arch=x86_64\u0026rpmmod=redhat-ds:11:8100020260312105752:37ed7c03"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@1.4.3.39-21.module%2Bel8dsrv%2B24083%2Bd25fcbb4?arch=x86_64\u0026rpmmod=redhat-ds:11:8100020260312105752:37ed7c03"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-debugsource-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-debugsource-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@1.4.3.39-21.module%2Bel8dsrv%2B24083%2Bd25fcbb4?arch=x86_64\u0026rpmmod=redhat-ds:11:8100020260312105752:37ed7c03"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-devel-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-devel-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@1.4.3.39-21.module%2Bel8dsrv%2B24083%2Bd25fcbb4?arch=x86_64\u0026rpmmod=redhat-ds:11:8100020260312105752:37ed7c03"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-legacy-tools-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-legacy-tools-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools@1.4.3.39-21.module%2Bel8dsrv%2B24083%2Bd25fcbb4?arch=x86_64\u0026rpmmod=redhat-ds:11:8100020260312105752:37ed7c03"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools-debuginfo@1.4.3.39-21.module%2Bel8dsrv%2B24083%2Bd25fcbb4?arch=x86_64\u0026rpmmod=redhat-ds:11:8100020260312105752:37ed7c03"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-libs-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-libs-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@1.4.3.39-21.module%2Bel8dsrv%2B24083%2Bd25fcbb4?arch=x86_64\u0026rpmmod=redhat-ds:11:8100020260312105752:37ed7c03"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-libs-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@1.4.3.39-21.module%2Bel8dsrv%2B24083%2Bd25fcbb4?arch=x86_64\u0026rpmmod=redhat-ds:11:8100020260312105752:37ed7c03"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-snmp-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-snmp-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@1.4.3.39-21.module%2Bel8dsrv%2B24083%2Bd25fcbb4?arch=x86_64\u0026rpmmod=redhat-ds:11:8100020260312105752:37ed7c03"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-snmp-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@1.4.3.39-21.module%2Bel8dsrv%2B24083%2Bd25fcbb4?arch=x86_64\u0026rpmmod=redhat-ds:11:8100020260312105752:37ed7c03"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "cockpit-389-ds-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.noarch::redhat-ds:11",
"product": {
"name": "cockpit-389-ds-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.noarch (redhat-ds:11)",
"product_id": "cockpit-389-ds-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.noarch::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cockpit-389-ds@1.4.3.39-21.module%2Bel8dsrv%2B24083%2Bd25fcbb4?arch=noarch\u0026rpmmod=redhat-ds:11:8100020260312105752:37ed7c03"
}
}
},
{
"category": "product_version",
"name": "python3-lib389-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.noarch::redhat-ds:11",
"product": {
"name": "python3-lib389-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.noarch (redhat-ds:11)",
"product_id": "python3-lib389-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.noarch::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-lib389@1.4.3.39-21.module%2Bel8dsrv%2B24083%2Bd25fcbb4?arch=noarch\u0026rpmmod=redhat-ds:11:8100020260312105752:37ed7c03"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.src (redhat-ds:11) as a component of Red Hat Directory Server 11.9 for RHEL 8",
"product_id": "8Base-DirSrv-11.9:389-ds-base-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.src::redhat-ds:11"
},
"product_reference": "389-ds-base-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.src::redhat-ds:11",
"relates_to_product_reference": "8Base-DirSrv-11.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.9 for RHEL 8",
"product_id": "8Base-DirSrv-11.9:389-ds-base-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"relates_to_product_reference": "8Base-DirSrv-11.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.9 for RHEL 8",
"product_id": "8Base-DirSrv-11.9:389-ds-base-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"relates_to_product_reference": "8Base-DirSrv-11.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.9 for RHEL 8",
"product_id": "8Base-DirSrv-11.9:389-ds-base-debugsource-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-debugsource-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"relates_to_product_reference": "8Base-DirSrv-11.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.9 for RHEL 8",
"product_id": "8Base-DirSrv-11.9:389-ds-base-devel-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-devel-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"relates_to_product_reference": "8Base-DirSrv-11.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.9 for RHEL 8",
"product_id": "8Base-DirSrv-11.9:389-ds-base-legacy-tools-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-legacy-tools-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"relates_to_product_reference": "8Base-DirSrv-11.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.9 for RHEL 8",
"product_id": "8Base-DirSrv-11.9:389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"relates_to_product_reference": "8Base-DirSrv-11.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.9 for RHEL 8",
"product_id": "8Base-DirSrv-11.9:389-ds-base-libs-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-libs-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"relates_to_product_reference": "8Base-DirSrv-11.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.9 for RHEL 8",
"product_id": "8Base-DirSrv-11.9:389-ds-base-libs-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-libs-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"relates_to_product_reference": "8Base-DirSrv-11.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.9 for RHEL 8",
"product_id": "8Base-DirSrv-11.9:389-ds-base-snmp-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-snmp-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"relates_to_product_reference": "8Base-DirSrv-11.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.9 for RHEL 8",
"product_id": "8Base-DirSrv-11.9:389-ds-base-snmp-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"relates_to_product_reference": "8Base-DirSrv-11.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-389-ds-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.noarch (redhat-ds:11) as a component of Red Hat Directory Server 11.9 for RHEL 8",
"product_id": "8Base-DirSrv-11.9:cockpit-389-ds-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.noarch::redhat-ds:11"
},
"product_reference": "cockpit-389-ds-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.noarch::redhat-ds:11",
"relates_to_product_reference": "8Base-DirSrv-11.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.noarch (redhat-ds:11) as a component of Red Hat Directory Server 11.9 for RHEL 8",
"product_id": "8Base-DirSrv-11.9:python3-lib389-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.noarch::redhat-ds:11"
},
"product_reference": "python3-lib389-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.noarch::redhat-ds:11",
"relates_to_product_reference": "8Base-DirSrv-11.9"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-14905",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-12-18T18:04:56.621000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423624"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Directory Server. A heap buffer overflow in the `389-ds-base` component can lead to a denial of service or potential remote code execution. Exploitation requires high privileges on the Directory Server, limiting the attack surface to authenticated administrative users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-DirSrv-11.9:389-ds-base-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.src::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-debugsource-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-devel-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-legacy-tools-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-libs-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-libs-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-snmp-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-snmp-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:cockpit-389-ds-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.noarch::redhat-ds:11",
"8Base-DirSrv-11.9:python3-lib389-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.noarch::redhat-ds:11"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "RHBZ#2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905"
}
],
"release_date": "2026-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T00:17:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-DirSrv-11.9:389-ds-base-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.src::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-debugsource-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-devel-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-legacy-tools-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-libs-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-libs-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-snmp-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-snmp-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:cockpit-389-ds-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.noarch::redhat-ds:11",
"8Base-DirSrv-11.9:python3-lib389-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.noarch::redhat-ds:11"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5514"
},
{
"category": "workaround",
"details": "Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.",
"product_ids": [
"8Base-DirSrv-11.9:389-ds-base-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.src::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-debugsource-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-devel-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-legacy-tools-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-libs-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-libs-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-snmp-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-snmp-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:cockpit-389-ds-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.noarch::redhat-ds:11",
"8Base-DirSrv-11.9:python3-lib389-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.noarch::redhat-ds:11"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-DirSrv-11.9:389-ds-base-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.src::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-debugsource-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-devel-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-legacy-tools-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-legacy-tools-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-libs-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-libs-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-snmp-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:389-ds-base-snmp-debuginfo-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.x86_64::redhat-ds:11",
"8Base-DirSrv-11.9:cockpit-389-ds-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.noarch::redhat-ds:11",
"8Base-DirSrv-11.9:python3-lib389-0:1.4.3.39-21.module+el8dsrv+24083+d25fcbb4.noarch::redhat-ds:11"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow"
}
]
}
RHSA-2026:5512
Vulnerability from csaf_redhat - Published: 2026-03-24 00:17 - Updated: 2026-03-31 17:31A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the redhat-ds:11 module is now available for Red Hat Directory Server 11.5 E4S for RHEL 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Directory Server is an LDAPv3-compliant directory server. The suite of packages includes the Lightweight Directory Access Protocol (LDAP) server, as well as command-line utilities and Web UI packages for server administration.\n\nSecurity Fix(es):\n\n* 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:5512",
"url": "https://access.redhat.com/errata/RHSA-2026:5512"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_5512.json"
}
],
"title": "Red Hat Security Advisory: redhat-ds:11 security update",
"tracking": {
"current_release_date": "2026-03-31T17:31:23+00:00",
"generator": {
"date": "2026-03-31T17:31:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:5512",
"initial_release_date": "2026-03-24T00:17:02+00:00",
"revision_history": [
{
"date": "2026-03-24T00:17:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-24T00:17:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-31T17:31:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Directory Server 11.5 E4S for RHEL 8",
"product": {
"name": "Red Hat Directory Server 11.5 E4S for RHEL 8",
"product_id": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:directory_server_e4s:11.5::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Directory Server"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.src::redhat-ds:11",
"product": {
"name": "389-ds-base-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.src (redhat-ds:11)",
"product_id": "389-ds-base-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.src::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.4.3.34-5.module%2Bel8dsrv%2B24053%2B0eac3b1a?arch=src\u0026rpmmod=redhat-ds:11:8060020260303152239:0ca98e7e"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.4.3.34-5.module%2Bel8dsrv%2B24053%2B0eac3b1a?arch=x86_64\u0026rpmmod=redhat-ds:11:8060020260303152239:0ca98e7e"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@1.4.3.34-5.module%2Bel8dsrv%2B24053%2B0eac3b1a?arch=x86_64\u0026rpmmod=redhat-ds:11:8060020260303152239:0ca98e7e"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-debugsource-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-debugsource-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@1.4.3.34-5.module%2Bel8dsrv%2B24053%2B0eac3b1a?arch=x86_64\u0026rpmmod=redhat-ds:11:8060020260303152239:0ca98e7e"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-devel-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-devel-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@1.4.3.34-5.module%2Bel8dsrv%2B24053%2B0eac3b1a?arch=x86_64\u0026rpmmod=redhat-ds:11:8060020260303152239:0ca98e7e"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-legacy-tools-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-legacy-tools-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools@1.4.3.34-5.module%2Bel8dsrv%2B24053%2B0eac3b1a?arch=x86_64\u0026rpmmod=redhat-ds:11:8060020260303152239:0ca98e7e"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools-debuginfo@1.4.3.34-5.module%2Bel8dsrv%2B24053%2B0eac3b1a?arch=x86_64\u0026rpmmod=redhat-ds:11:8060020260303152239:0ca98e7e"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-libs-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-libs-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@1.4.3.34-5.module%2Bel8dsrv%2B24053%2B0eac3b1a?arch=x86_64\u0026rpmmod=redhat-ds:11:8060020260303152239:0ca98e7e"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-libs-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@1.4.3.34-5.module%2Bel8dsrv%2B24053%2B0eac3b1a?arch=x86_64\u0026rpmmod=redhat-ds:11:8060020260303152239:0ca98e7e"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-snmp-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-snmp-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@1.4.3.34-5.module%2Bel8dsrv%2B24053%2B0eac3b1a?arch=x86_64\u0026rpmmod=redhat-ds:11:8060020260303152239:0ca98e7e"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-snmp-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@1.4.3.34-5.module%2Bel8dsrv%2B24053%2B0eac3b1a?arch=x86_64\u0026rpmmod=redhat-ds:11:8060020260303152239:0ca98e7e"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "cockpit-389-ds-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.noarch::redhat-ds:11",
"product": {
"name": "cockpit-389-ds-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.noarch (redhat-ds:11)",
"product_id": "cockpit-389-ds-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.noarch::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cockpit-389-ds@1.4.3.34-5.module%2Bel8dsrv%2B24053%2B0eac3b1a?arch=noarch\u0026rpmmod=redhat-ds:11:8060020260303152239:0ca98e7e"
}
}
},
{
"category": "product_version",
"name": "python3-lib389-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.noarch::redhat-ds:11",
"product": {
"name": "python3-lib389-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.noarch (redhat-ds:11)",
"product_id": "python3-lib389-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.noarch::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-lib389@1.4.3.34-5.module%2Bel8dsrv%2B24053%2B0eac3b1a?arch=noarch\u0026rpmmod=redhat-ds:11:8060020260303152239:0ca98e7e"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.src (redhat-ds:11) as a component of Red Hat Directory Server 11.5 E4S for RHEL 8",
"product_id": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.src::redhat-ds:11"
},
"product_reference": "389-ds-base-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.src::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.5 E4S for RHEL 8",
"product_id": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.5 E4S for RHEL 8",
"product_id": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.5 E4S for RHEL 8",
"product_id": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-debugsource-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-debugsource-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.5 E4S for RHEL 8",
"product_id": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-devel-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-devel-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.5 E4S for RHEL 8",
"product_id": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-legacy-tools-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-legacy-tools-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.5 E4S for RHEL 8",
"product_id": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.5 E4S for RHEL 8",
"product_id": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-libs-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-libs-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.5 E4S for RHEL 8",
"product_id": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-libs-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.5 E4S for RHEL 8",
"product_id": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-snmp-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-snmp-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.5 E4S for RHEL 8",
"product_id": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-389-ds-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.noarch (redhat-ds:11) as a component of Red Hat Directory Server 11.5 E4S for RHEL 8",
"product_id": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:cockpit-389-ds-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.noarch::redhat-ds:11"
},
"product_reference": "cockpit-389-ds-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.noarch::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.noarch (redhat-ds:11) as a component of Red Hat Directory Server 11.5 E4S for RHEL 8",
"product_id": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:python3-lib389-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.noarch::redhat-ds:11"
},
"product_reference": "python3-lib389-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.noarch::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-14905",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-12-18T18:04:56.621000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423624"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Directory Server. A heap buffer overflow in the `389-ds-base` component can lead to a denial of service or potential remote code execution. Exploitation requires high privileges on the Directory Server, limiting the attack surface to authenticated administrative users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.src::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-debugsource-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-devel-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-legacy-tools-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-libs-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-snmp-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:cockpit-389-ds-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.noarch::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:python3-lib389-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.noarch::redhat-ds:11"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "RHBZ#2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905"
}
],
"release_date": "2026-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T00:17:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.src::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-debugsource-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-devel-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-legacy-tools-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-libs-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-snmp-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:cockpit-389-ds-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.noarch::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:python3-lib389-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.noarch::redhat-ds:11"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5512"
},
{
"category": "workaround",
"details": "Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.",
"product_ids": [
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.src::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-debugsource-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-devel-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-legacy-tools-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-libs-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-snmp-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:cockpit-389-ds-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.noarch::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:python3-lib389-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.noarch::redhat-ds:11"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.src::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-debugsource-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-devel-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-legacy-tools-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-libs-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-snmp-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.x86_64::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:cockpit-389-ds-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.noarch::redhat-ds:11",
"BaseOS-8.6.0.Z.E4S-DirSrv-11.5-E4S:python3-lib389-0:1.4.3.34-5.module+el8dsrv+24053+0eac3b1a.noarch::redhat-ds:11"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow"
}
]
}
RHSA-2026:5598
Vulnerability from csaf_redhat - Published: 2026-03-24 10:16 - Updated: 2026-03-31 17:28A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for 389-ds-base is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.\n\nSecurity Fix(es):\n\n* 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:5598",
"url": "https://access.redhat.com/errata/RHSA-2026:5598"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_5598.json"
}
],
"title": "Red Hat Security Advisory: 389-ds-base security update",
"tracking": {
"current_release_date": "2026-03-31T17:28:46+00:00",
"generator": {
"date": "2026-03-31T17:28:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:5598",
"initial_release_date": "2026-03-24T10:16:47+00:00",
"revision_history": [
{
"date": "2026-03-24T10:16:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-24T10:16:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-31T17:28:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.2.4-17.el9_2.x86_64",
"product": {
"name": "389-ds-base-0:2.2.4-17.el9_2.x86_64",
"product_id": "389-ds-base-0:2.2.4-17.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.2.4-17.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.2.4-17.el9_2.x86_64",
"product": {
"name": "389-ds-base-libs-0:2.2.4-17.el9_2.x86_64",
"product_id": "389-ds-base-libs-0:2.2.4-17.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.2.4-17.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.2.4-17.el9_2.x86_64",
"product": {
"name": "389-ds-base-debugsource-0:2.2.4-17.el9_2.x86_64",
"product_id": "389-ds-base-debugsource-0:2.2.4-17.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.2.4-17.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.2.4-17.el9_2.x86_64",
"product": {
"name": "389-ds-base-debuginfo-0:2.2.4-17.el9_2.x86_64",
"product_id": "389-ds-base-debuginfo-0:2.2.4-17.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.2.4-17.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.x86_64",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.x86_64",
"product_id": "389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.2.4-17.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.x86_64",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.x86_64",
"product_id": "389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.2.4-17.el9_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.2.4-17.el9_2.s390x",
"product": {
"name": "389-ds-base-0:2.2.4-17.el9_2.s390x",
"product_id": "389-ds-base-0:2.2.4-17.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.2.4-17.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.2.4-17.el9_2.s390x",
"product": {
"name": "389-ds-base-libs-0:2.2.4-17.el9_2.s390x",
"product_id": "389-ds-base-libs-0:2.2.4-17.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.2.4-17.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.2.4-17.el9_2.s390x",
"product": {
"name": "389-ds-base-debugsource-0:2.2.4-17.el9_2.s390x",
"product_id": "389-ds-base-debugsource-0:2.2.4-17.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.2.4-17.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.2.4-17.el9_2.s390x",
"product": {
"name": "389-ds-base-debuginfo-0:2.2.4-17.el9_2.s390x",
"product_id": "389-ds-base-debuginfo-0:2.2.4-17.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.2.4-17.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.s390x",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.s390x",
"product_id": "389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.2.4-17.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.s390x",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.s390x",
"product_id": "389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.2.4-17.el9_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.2.4-17.el9_2.src",
"product": {
"name": "389-ds-base-0:2.2.4-17.el9_2.src",
"product_id": "389-ds-base-0:2.2.4-17.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.2.4-17.el9_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.2.4-17.el9_2.aarch64",
"product": {
"name": "389-ds-base-0:2.2.4-17.el9_2.aarch64",
"product_id": "389-ds-base-0:2.2.4-17.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.2.4-17.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.2.4-17.el9_2.aarch64",
"product": {
"name": "389-ds-base-libs-0:2.2.4-17.el9_2.aarch64",
"product_id": "389-ds-base-libs-0:2.2.4-17.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.2.4-17.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.2.4-17.el9_2.aarch64",
"product": {
"name": "389-ds-base-debugsource-0:2.2.4-17.el9_2.aarch64",
"product_id": "389-ds-base-debugsource-0:2.2.4-17.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.2.4-17.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.2.4-17.el9_2.aarch64",
"product": {
"name": "389-ds-base-debuginfo-0:2.2.4-17.el9_2.aarch64",
"product_id": "389-ds-base-debuginfo-0:2.2.4-17.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.2.4-17.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.aarch64",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.aarch64",
"product_id": "389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.2.4-17.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.aarch64",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.aarch64",
"product_id": "389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.2.4-17.el9_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.2.4-17.el9_2.ppc64le",
"product": {
"name": "389-ds-base-0:2.2.4-17.el9_2.ppc64le",
"product_id": "389-ds-base-0:2.2.4-17.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.2.4-17.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.2.4-17.el9_2.ppc64le",
"product": {
"name": "389-ds-base-libs-0:2.2.4-17.el9_2.ppc64le",
"product_id": "389-ds-base-libs-0:2.2.4-17.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.2.4-17.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.2.4-17.el9_2.ppc64le",
"product": {
"name": "389-ds-base-debugsource-0:2.2.4-17.el9_2.ppc64le",
"product_id": "389-ds-base-debugsource-0:2.2.4-17.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.2.4-17.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.2.4-17.el9_2.ppc64le",
"product": {
"name": "389-ds-base-debuginfo-0:2.2.4-17.el9_2.ppc64le",
"product_id": "389-ds-base-debuginfo-0:2.2.4-17.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.2.4-17.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.ppc64le",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.ppc64le",
"product_id": "389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.2.4-17.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.ppc64le",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.ppc64le",
"product_id": "389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.2.4-17.el9_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-lib389-0:2.2.4-17.el9_2.noarch",
"product": {
"name": "python3-lib389-0:2.2.4-17.el9_2.noarch",
"product_id": "python3-lib389-0:2.2.4-17.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-lib389@2.2.4-17.el9_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.2.4-17.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:389-ds-base-0:2.2.4-17.el9_2.aarch64"
},
"product_reference": "389-ds-base-0:2.2.4-17.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.2.4-17.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:389-ds-base-0:2.2.4-17.el9_2.ppc64le"
},
"product_reference": "389-ds-base-0:2.2.4-17.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.2.4-17.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:389-ds-base-0:2.2.4-17.el9_2.s390x"
},
"product_reference": "389-ds-base-0:2.2.4-17.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.2.4-17.el9_2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:389-ds-base-0:2.2.4-17.el9_2.src"
},
"product_reference": "389-ds-base-0:2.2.4-17.el9_2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.2.4-17.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:389-ds-base-0:2.2.4-17.el9_2.x86_64"
},
"product_reference": "389-ds-base-0:2.2.4-17.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.2.4-17.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:389-ds-base-debuginfo-0:2.2.4-17.el9_2.aarch64"
},
"product_reference": "389-ds-base-debuginfo-0:2.2.4-17.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.2.4-17.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:389-ds-base-debuginfo-0:2.2.4-17.el9_2.ppc64le"
},
"product_reference": "389-ds-base-debuginfo-0:2.2.4-17.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.2.4-17.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:389-ds-base-debuginfo-0:2.2.4-17.el9_2.s390x"
},
"product_reference": "389-ds-base-debuginfo-0:2.2.4-17.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.2.4-17.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:389-ds-base-debuginfo-0:2.2.4-17.el9_2.x86_64"
},
"product_reference": "389-ds-base-debuginfo-0:2.2.4-17.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.2.4-17.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:389-ds-base-debugsource-0:2.2.4-17.el9_2.aarch64"
},
"product_reference": "389-ds-base-debugsource-0:2.2.4-17.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.2.4-17.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:389-ds-base-debugsource-0:2.2.4-17.el9_2.ppc64le"
},
"product_reference": "389-ds-base-debugsource-0:2.2.4-17.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.2.4-17.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:389-ds-base-debugsource-0:2.2.4-17.el9_2.s390x"
},
"product_reference": "389-ds-base-debugsource-0:2.2.4-17.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.2.4-17.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:389-ds-base-debugsource-0:2.2.4-17.el9_2.x86_64"
},
"product_reference": "389-ds-base-debugsource-0:2.2.4-17.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.2.4-17.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:389-ds-base-libs-0:2.2.4-17.el9_2.aarch64"
},
"product_reference": "389-ds-base-libs-0:2.2.4-17.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.2.4-17.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:389-ds-base-libs-0:2.2.4-17.el9_2.ppc64le"
},
"product_reference": "389-ds-base-libs-0:2.2.4-17.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.2.4-17.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:389-ds-base-libs-0:2.2.4-17.el9_2.s390x"
},
"product_reference": "389-ds-base-libs-0:2.2.4-17.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.2.4-17.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:389-ds-base-libs-0:2.2.4-17.el9_2.x86_64"
},
"product_reference": "389-ds-base-libs-0:2.2.4-17.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.aarch64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.ppc64le"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.s390x"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.x86_64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.aarch64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.ppc64le"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.s390x"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.x86_64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:2.2.4-17.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:python3-lib389-0:2.2.4-17.el9_2.noarch"
},
"product_reference": "python3-lib389-0:2.2.4-17.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-14905",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-12-18T18:04:56.621000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423624"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Directory Server. A heap buffer overflow in the `389-ds-base` component can lead to a denial of service or potential remote code execution. Exploitation requires high privileges on the Directory Server, limiting the attack surface to authenticated administrative users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.E4S:389-ds-base-0:2.2.4-17.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:389-ds-base-0:2.2.4-17.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:389-ds-base-0:2.2.4-17.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:389-ds-base-0:2.2.4-17.el9_2.src",
"AppStream-9.2.0.Z.E4S:389-ds-base-0:2.2.4-17.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:389-ds-base-debuginfo-0:2.2.4-17.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:389-ds-base-debuginfo-0:2.2.4-17.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:389-ds-base-debuginfo-0:2.2.4-17.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:389-ds-base-debuginfo-0:2.2.4-17.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:389-ds-base-debugsource-0:2.2.4-17.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:389-ds-base-debugsource-0:2.2.4-17.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:389-ds-base-debugsource-0:2.2.4-17.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:389-ds-base-debugsource-0:2.2.4-17.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-0:2.2.4-17.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-0:2.2.4-17.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-0:2.2.4-17.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-0:2.2.4-17.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:python3-lib389-0:2.2.4-17.el9_2.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "RHBZ#2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905"
}
],
"release_date": "2026-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T10:16:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.E4S:389-ds-base-0:2.2.4-17.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:389-ds-base-0:2.2.4-17.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:389-ds-base-0:2.2.4-17.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:389-ds-base-0:2.2.4-17.el9_2.src",
"AppStream-9.2.0.Z.E4S:389-ds-base-0:2.2.4-17.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:389-ds-base-debuginfo-0:2.2.4-17.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:389-ds-base-debuginfo-0:2.2.4-17.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:389-ds-base-debuginfo-0:2.2.4-17.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:389-ds-base-debuginfo-0:2.2.4-17.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:389-ds-base-debugsource-0:2.2.4-17.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:389-ds-base-debugsource-0:2.2.4-17.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:389-ds-base-debugsource-0:2.2.4-17.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:389-ds-base-debugsource-0:2.2.4-17.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-0:2.2.4-17.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-0:2.2.4-17.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-0:2.2.4-17.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-0:2.2.4-17.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:python3-lib389-0:2.2.4-17.el9_2.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5598"
},
{
"category": "workaround",
"details": "Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.",
"product_ids": [
"AppStream-9.2.0.Z.E4S:389-ds-base-0:2.2.4-17.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:389-ds-base-0:2.2.4-17.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:389-ds-base-0:2.2.4-17.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:389-ds-base-0:2.2.4-17.el9_2.src",
"AppStream-9.2.0.Z.E4S:389-ds-base-0:2.2.4-17.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:389-ds-base-debuginfo-0:2.2.4-17.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:389-ds-base-debuginfo-0:2.2.4-17.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:389-ds-base-debuginfo-0:2.2.4-17.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:389-ds-base-debuginfo-0:2.2.4-17.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:389-ds-base-debugsource-0:2.2.4-17.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:389-ds-base-debugsource-0:2.2.4-17.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:389-ds-base-debugsource-0:2.2.4-17.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:389-ds-base-debugsource-0:2.2.4-17.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-0:2.2.4-17.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-0:2.2.4-17.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-0:2.2.4-17.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-0:2.2.4-17.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:python3-lib389-0:2.2.4-17.el9_2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.E4S:389-ds-base-0:2.2.4-17.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:389-ds-base-0:2.2.4-17.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:389-ds-base-0:2.2.4-17.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:389-ds-base-0:2.2.4-17.el9_2.src",
"AppStream-9.2.0.Z.E4S:389-ds-base-0:2.2.4-17.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:389-ds-base-debuginfo-0:2.2.4-17.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:389-ds-base-debuginfo-0:2.2.4-17.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:389-ds-base-debuginfo-0:2.2.4-17.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:389-ds-base-debuginfo-0:2.2.4-17.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:389-ds-base-debugsource-0:2.2.4-17.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:389-ds-base-debugsource-0:2.2.4-17.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:389-ds-base-debugsource-0:2.2.4-17.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:389-ds-base-debugsource-0:2.2.4-17.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-0:2.2.4-17.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-0:2.2.4-17.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-0:2.2.4-17.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-0:2.2.4-17.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.2.4-17.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.2.4-17.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:python3-lib389-0:2.2.4-17.el9_2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow"
}
]
}
RHSA-2026:5569
Vulnerability from csaf_redhat - Published: 2026-03-24 08:48 - Updated: 2026-03-31 17:31A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the redhat-ds:12 module is now available for Red Hat Directory Server 12.2 E4S for RHEL 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Directory Server is an LDAPv3-compliant directory server. The suite of packages includes the Lightweight Directory Access Protocol (LDAP) server, as well as command-line utilities and Web UI packages for server administration.\n\nSecurity Fix(es):\n\n* 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:5569",
"url": "https://access.redhat.com/errata/RHSA-2026:5569"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_5569.json"
}
],
"title": "Red Hat Security Advisory: redhat-ds:12 security update",
"tracking": {
"current_release_date": "2026-03-31T17:31:21+00:00",
"generator": {
"date": "2026-03-31T17:31:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:5569",
"initial_release_date": "2026-03-24T08:48:47+00:00",
"revision_history": [
{
"date": "2026-03-24T08:48:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-24T08:48:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-31T17:31:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Directory Server 12.2 E4S for RHEL 9",
"product": {
"name": "Red Hat Directory Server 12.2 E4S for RHEL 9",
"product_id": "BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:directory_server_e4s:12.2::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Directory Server"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.2.7-14.module+el9dsrv+24059+d750c81f.src::redhat-ds:12",
"product": {
"name": "389-ds-base-0:2.2.7-14.module+el9dsrv+24059+d750c81f.src (redhat-ds:12)",
"product_id": "389-ds-base-0:2.2.7-14.module+el9dsrv+24059+d750c81f.src::redhat-ds:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.2.7-14.module%2Bel9dsrv%2B24059%2Bd750c81f?arch=src\u0026rpmmod=redhat-ds:12:9020020260304180546:1674d574"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"product": {
"name": "389-ds-base-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64 (redhat-ds:12)",
"product_id": "389-ds-base-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.2.7-14.module%2Bel9dsrv%2B24059%2Bd750c81f?arch=x86_64\u0026rpmmod=redhat-ds:12:9020020260304180546:1674d574"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"product": {
"name": "389-ds-base-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64 (redhat-ds:12)",
"product_id": "389-ds-base-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.2.7-14.module%2Bel9dsrv%2B24059%2Bd750c81f?arch=x86_64\u0026rpmmod=redhat-ds:12:9020020260304180546:1674d574"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"product": {
"name": "389-ds-base-debugsource-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64 (redhat-ds:12)",
"product_id": "389-ds-base-debugsource-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.2.7-14.module%2Bel9dsrv%2B24059%2Bd750c81f?arch=x86_64\u0026rpmmod=redhat-ds:12:9020020260304180546:1674d574"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"product": {
"name": "389-ds-base-devel-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64 (redhat-ds:12)",
"product_id": "389-ds-base-devel-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@2.2.7-14.module%2Bel9dsrv%2B24059%2Bd750c81f?arch=x86_64\u0026rpmmod=redhat-ds:12:9020020260304180546:1674d574"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"product": {
"name": "389-ds-base-libs-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64 (redhat-ds:12)",
"product_id": "389-ds-base-libs-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.2.7-14.module%2Bel9dsrv%2B24059%2Bd750c81f?arch=x86_64\u0026rpmmod=redhat-ds:12:9020020260304180546:1674d574"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64 (redhat-ds:12)",
"product_id": "389-ds-base-libs-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.2.7-14.module%2Bel9dsrv%2B24059%2Bd750c81f?arch=x86_64\u0026rpmmod=redhat-ds:12:9020020260304180546:1674d574"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"product": {
"name": "389-ds-base-snmp-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64 (redhat-ds:12)",
"product_id": "389-ds-base-snmp-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@2.2.7-14.module%2Bel9dsrv%2B24059%2Bd750c81f?arch=x86_64\u0026rpmmod=redhat-ds:12:9020020260304180546:1674d574"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64 (redhat-ds:12)",
"product_id": "389-ds-base-snmp-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.2.7-14.module%2Bel9dsrv%2B24059%2Bd750c81f?arch=x86_64\u0026rpmmod=redhat-ds:12:9020020260304180546:1674d574"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "cockpit-389-ds-0:2.2.7-14.module+el9dsrv+24059+d750c81f.noarch::redhat-ds:12",
"product": {
"name": "cockpit-389-ds-0:2.2.7-14.module+el9dsrv+24059+d750c81f.noarch (redhat-ds:12)",
"product_id": "cockpit-389-ds-0:2.2.7-14.module+el9dsrv+24059+d750c81f.noarch::redhat-ds:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cockpit-389-ds@2.2.7-14.module%2Bel9dsrv%2B24059%2Bd750c81f?arch=noarch\u0026rpmmod=redhat-ds:12:9020020260304180546:1674d574"
}
}
},
{
"category": "product_version",
"name": "python3-lib389-0:2.2.7-14.module+el9dsrv+24059+d750c81f.noarch::redhat-ds:12",
"product": {
"name": "python3-lib389-0:2.2.7-14.module+el9dsrv+24059+d750c81f.noarch (redhat-ds:12)",
"product_id": "python3-lib389-0:2.2.7-14.module+el9dsrv+24059+d750c81f.noarch::redhat-ds:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-lib389@2.2.7-14.module%2Bel9dsrv%2B24059%2Bd750c81f?arch=noarch\u0026rpmmod=redhat-ds:12:9020020260304180546:1674d574"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.2.7-14.module+el9dsrv+24059+d750c81f.src (redhat-ds:12) as a component of Red Hat Directory Server 12.2 E4S for RHEL 9",
"product_id": "BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-0:2.2.7-14.module+el9dsrv+24059+d750c81f.src::redhat-ds:12"
},
"product_reference": "389-ds-base-0:2.2.7-14.module+el9dsrv+24059+d750c81f.src::redhat-ds:12",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64 (redhat-ds:12) as a component of Red Hat Directory Server 12.2 E4S for RHEL 9",
"product_id": "BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12"
},
"product_reference": "389-ds-base-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64 (redhat-ds:12) as a component of Red Hat Directory Server 12.2 E4S for RHEL 9",
"product_id": "BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12"
},
"product_reference": "389-ds-base-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64 (redhat-ds:12) as a component of Red Hat Directory Server 12.2 E4S for RHEL 9",
"product_id": "BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-debugsource-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12"
},
"product_reference": "389-ds-base-debugsource-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64 (redhat-ds:12) as a component of Red Hat Directory Server 12.2 E4S for RHEL 9",
"product_id": "BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-devel-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12"
},
"product_reference": "389-ds-base-devel-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64 (redhat-ds:12) as a component of Red Hat Directory Server 12.2 E4S for RHEL 9",
"product_id": "BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-libs-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12"
},
"product_reference": "389-ds-base-libs-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64 (redhat-ds:12) as a component of Red Hat Directory Server 12.2 E4S for RHEL 9",
"product_id": "BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-libs-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64 (redhat-ds:12) as a component of Red Hat Directory Server 12.2 E4S for RHEL 9",
"product_id": "BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-snmp-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12"
},
"product_reference": "389-ds-base-snmp-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64 (redhat-ds:12) as a component of Red Hat Directory Server 12.2 E4S for RHEL 9",
"product_id": "BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-snmp-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-389-ds-0:2.2.7-14.module+el9dsrv+24059+d750c81f.noarch (redhat-ds:12) as a component of Red Hat Directory Server 12.2 E4S for RHEL 9",
"product_id": "BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:cockpit-389-ds-0:2.2.7-14.module+el9dsrv+24059+d750c81f.noarch::redhat-ds:12"
},
"product_reference": "cockpit-389-ds-0:2.2.7-14.module+el9dsrv+24059+d750c81f.noarch::redhat-ds:12",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:2.2.7-14.module+el9dsrv+24059+d750c81f.noarch (redhat-ds:12) as a component of Red Hat Directory Server 12.2 E4S for RHEL 9",
"product_id": "BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:python3-lib389-0:2.2.7-14.module+el9dsrv+24059+d750c81f.noarch::redhat-ds:12"
},
"product_reference": "python3-lib389-0:2.2.7-14.module+el9dsrv+24059+d750c81f.noarch::redhat-ds:12",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-14905",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-12-18T18:04:56.621000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423624"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Directory Server. A heap buffer overflow in the `389-ds-base` component can lead to a denial of service or potential remote code execution. Exploitation requires high privileges on the Directory Server, limiting the attack surface to authenticated administrative users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-0:2.2.7-14.module+el9dsrv+24059+d750c81f.src::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-debugsource-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-devel-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-libs-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-libs-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-snmp-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-snmp-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:cockpit-389-ds-0:2.2.7-14.module+el9dsrv+24059+d750c81f.noarch::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:python3-lib389-0:2.2.7-14.module+el9dsrv+24059+d750c81f.noarch::redhat-ds:12"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "RHBZ#2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905"
}
],
"release_date": "2026-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T08:48:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-0:2.2.7-14.module+el9dsrv+24059+d750c81f.src::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-debugsource-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-devel-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-libs-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-libs-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-snmp-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-snmp-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:cockpit-389-ds-0:2.2.7-14.module+el9dsrv+24059+d750c81f.noarch::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:python3-lib389-0:2.2.7-14.module+el9dsrv+24059+d750c81f.noarch::redhat-ds:12"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5569"
},
{
"category": "workaround",
"details": "Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.",
"product_ids": [
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-0:2.2.7-14.module+el9dsrv+24059+d750c81f.src::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-debugsource-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-devel-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-libs-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-libs-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-snmp-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-snmp-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:cockpit-389-ds-0:2.2.7-14.module+el9dsrv+24059+d750c81f.noarch::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:python3-lib389-0:2.2.7-14.module+el9dsrv+24059+d750c81f.noarch::redhat-ds:12"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-0:2.2.7-14.module+el9dsrv+24059+d750c81f.src::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-debugsource-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-devel-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-libs-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-libs-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-snmp-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:389-ds-base-snmp-debuginfo-0:2.2.7-14.module+el9dsrv+24059+d750c81f.x86_64::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:cockpit-389-ds-0:2.2.7-14.module+el9dsrv+24059+d750c81f.noarch::redhat-ds:12",
"BaseOS-9.2.0.Z.E4S-DirSrv-12.2-E4S:python3-lib389-0:2.2.7-14.module+el9dsrv+24059+d750c81f.noarch::redhat-ds:12"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow"
}
]
}
RHSA-2026:4207
Vulnerability from csaf_redhat - Published: 2026-03-10 22:08 - Updated: 2026-03-31 17:24A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for 389-ds-base is now available for Red Hat Enterprise Linux 9.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.\n\nSecurity Fix(es):\n\n* 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:4207",
"url": "https://access.redhat.com/errata/RHSA-2026:4207"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "external",
"summary": "RHEL-140087",
"url": "https://issues.redhat.com/browse/RHEL-140087"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_4207.json"
}
],
"title": "Red Hat Security Advisory: 389-ds-base security update",
"tracking": {
"current_release_date": "2026-03-31T17:24:17+00:00",
"generator": {
"date": "2026-03-31T17:24:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:4207",
"initial_release_date": "2026-03-10T22:08:24+00:00",
"revision_history": [
{
"date": "2026-03-10T22:08:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-10T22:08:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-31T17:24:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.6::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.6.1-20.el9_6.src",
"product": {
"name": "389-ds-base-0:2.6.1-20.el9_6.src",
"product_id": "389-ds-base-0:2.6.1-20.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.6.1-20.el9_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.6.1-20.el9_6.aarch64",
"product": {
"name": "389-ds-base-0:2.6.1-20.el9_6.aarch64",
"product_id": "389-ds-base-0:2.6.1-20.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.6.1-20.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.6.1-20.el9_6.aarch64",
"product": {
"name": "389-ds-base-libs-0:2.6.1-20.el9_6.aarch64",
"product_id": "389-ds-base-libs-0:2.6.1-20.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.6.1-20.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:2.6.1-20.el9_6.aarch64",
"product": {
"name": "389-ds-base-snmp-0:2.6.1-20.el9_6.aarch64",
"product_id": "389-ds-base-snmp-0:2.6.1-20.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@2.6.1-20.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.6.1-20.el9_6.aarch64",
"product": {
"name": "389-ds-base-debugsource-0:2.6.1-20.el9_6.aarch64",
"product_id": "389-ds-base-debugsource-0:2.6.1-20.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.6.1-20.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.aarch64",
"product": {
"name": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.aarch64",
"product_id": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.6.1-20.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.aarch64",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.aarch64",
"product_id": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.6.1-20.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.aarch64",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.aarch64",
"product_id": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.6.1-20.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:2.6.1-20.el9_6.aarch64",
"product": {
"name": "389-ds-base-devel-0:2.6.1-20.el9_6.aarch64",
"product_id": "389-ds-base-devel-0:2.6.1-20.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@2.6.1-20.el9_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.6.1-20.el9_6.ppc64le",
"product": {
"name": "389-ds-base-0:2.6.1-20.el9_6.ppc64le",
"product_id": "389-ds-base-0:2.6.1-20.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.6.1-20.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.6.1-20.el9_6.ppc64le",
"product": {
"name": "389-ds-base-libs-0:2.6.1-20.el9_6.ppc64le",
"product_id": "389-ds-base-libs-0:2.6.1-20.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.6.1-20.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:2.6.1-20.el9_6.ppc64le",
"product": {
"name": "389-ds-base-snmp-0:2.6.1-20.el9_6.ppc64le",
"product_id": "389-ds-base-snmp-0:2.6.1-20.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@2.6.1-20.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.6.1-20.el9_6.ppc64le",
"product": {
"name": "389-ds-base-debugsource-0:2.6.1-20.el9_6.ppc64le",
"product_id": "389-ds-base-debugsource-0:2.6.1-20.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.6.1-20.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"product": {
"name": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"product_id": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.6.1-20.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"product_id": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.6.1-20.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"product_id": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.6.1-20.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:2.6.1-20.el9_6.ppc64le",
"product": {
"name": "389-ds-base-devel-0:2.6.1-20.el9_6.ppc64le",
"product_id": "389-ds-base-devel-0:2.6.1-20.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@2.6.1-20.el9_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.6.1-20.el9_6.x86_64",
"product": {
"name": "389-ds-base-0:2.6.1-20.el9_6.x86_64",
"product_id": "389-ds-base-0:2.6.1-20.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.6.1-20.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.6.1-20.el9_6.x86_64",
"product": {
"name": "389-ds-base-libs-0:2.6.1-20.el9_6.x86_64",
"product_id": "389-ds-base-libs-0:2.6.1-20.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.6.1-20.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:2.6.1-20.el9_6.x86_64",
"product": {
"name": "389-ds-base-snmp-0:2.6.1-20.el9_6.x86_64",
"product_id": "389-ds-base-snmp-0:2.6.1-20.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@2.6.1-20.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.6.1-20.el9_6.x86_64",
"product": {
"name": "389-ds-base-debugsource-0:2.6.1-20.el9_6.x86_64",
"product_id": "389-ds-base-debugsource-0:2.6.1-20.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.6.1-20.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.x86_64",
"product": {
"name": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.x86_64",
"product_id": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.6.1-20.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.x86_64",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.x86_64",
"product_id": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.6.1-20.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.x86_64",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.x86_64",
"product_id": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.6.1-20.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:2.6.1-20.el9_6.x86_64",
"product": {
"name": "389-ds-base-devel-0:2.6.1-20.el9_6.x86_64",
"product_id": "389-ds-base-devel-0:2.6.1-20.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@2.6.1-20.el9_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.6.1-20.el9_6.s390x",
"product": {
"name": "389-ds-base-0:2.6.1-20.el9_6.s390x",
"product_id": "389-ds-base-0:2.6.1-20.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.6.1-20.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.6.1-20.el9_6.s390x",
"product": {
"name": "389-ds-base-libs-0:2.6.1-20.el9_6.s390x",
"product_id": "389-ds-base-libs-0:2.6.1-20.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.6.1-20.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:2.6.1-20.el9_6.s390x",
"product": {
"name": "389-ds-base-snmp-0:2.6.1-20.el9_6.s390x",
"product_id": "389-ds-base-snmp-0:2.6.1-20.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@2.6.1-20.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.6.1-20.el9_6.s390x",
"product": {
"name": "389-ds-base-debugsource-0:2.6.1-20.el9_6.s390x",
"product_id": "389-ds-base-debugsource-0:2.6.1-20.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.6.1-20.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.s390x",
"product": {
"name": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.s390x",
"product_id": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.6.1-20.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.s390x",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.s390x",
"product_id": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.6.1-20.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.s390x",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.s390x",
"product_id": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.6.1-20.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:2.6.1-20.el9_6.s390x",
"product": {
"name": "389-ds-base-devel-0:2.6.1-20.el9_6.s390x",
"product_id": "389-ds-base-devel-0:2.6.1-20.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@2.6.1-20.el9_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-lib389-0:2.6.1-20.el9_6.noarch",
"product": {
"name": "python3-lib389-0:2.6.1-20.el9_6.noarch",
"product_id": "python3-lib389-0:2.6.1-20.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-lib389@2.6.1-20.el9_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.6.1-20.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.aarch64"
},
"product_reference": "389-ds-base-0:2.6.1-20.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.6.1-20.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.ppc64le"
},
"product_reference": "389-ds-base-0:2.6.1-20.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.6.1-20.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.s390x"
},
"product_reference": "389-ds-base-0:2.6.1-20.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.6.1-20.el9_6.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.src"
},
"product_reference": "389-ds-base-0:2.6.1-20.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.6.1-20.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.x86_64"
},
"product_reference": "389-ds-base-0:2.6.1-20.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.aarch64"
},
"product_reference": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.ppc64le"
},
"product_reference": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.s390x"
},
"product_reference": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.x86_64"
},
"product_reference": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.6.1-20.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.aarch64"
},
"product_reference": "389-ds-base-debugsource-0:2.6.1-20.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.6.1-20.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.ppc64le"
},
"product_reference": "389-ds-base-debugsource-0:2.6.1-20.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.6.1-20.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.s390x"
},
"product_reference": "389-ds-base-debugsource-0:2.6.1-20.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.6.1-20.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.x86_64"
},
"product_reference": "389-ds-base-debugsource-0:2.6.1-20.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.6.1-20.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.aarch64"
},
"product_reference": "389-ds-base-devel-0:2.6.1-20.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.6.1-20.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.ppc64le"
},
"product_reference": "389-ds-base-devel-0:2.6.1-20.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.6.1-20.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.s390x"
},
"product_reference": "389-ds-base-devel-0:2.6.1-20.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.6.1-20.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.x86_64"
},
"product_reference": "389-ds-base-devel-0:2.6.1-20.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.6.1-20.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.aarch64"
},
"product_reference": "389-ds-base-libs-0:2.6.1-20.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.6.1-20.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.ppc64le"
},
"product_reference": "389-ds-base-libs-0:2.6.1-20.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.6.1-20.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.s390x"
},
"product_reference": "389-ds-base-libs-0:2.6.1-20.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.6.1-20.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.x86_64"
},
"product_reference": "389-ds-base-libs-0:2.6.1-20.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.aarch64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.ppc64le"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.s390x"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.x86_64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.6.1-20.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.aarch64"
},
"product_reference": "389-ds-base-snmp-0:2.6.1-20.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.6.1-20.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.ppc64le"
},
"product_reference": "389-ds-base-snmp-0:2.6.1-20.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.6.1-20.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.s390x"
},
"product_reference": "389-ds-base-snmp-0:2.6.1-20.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.6.1-20.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.x86_64"
},
"product_reference": "389-ds-base-snmp-0:2.6.1-20.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.aarch64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.ppc64le"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.s390x"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.x86_64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:2.6.1-20.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:python3-lib389-0:2.6.1-20.el9_6.noarch"
},
"product_reference": "python3-lib389-0:2.6.1-20.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.6.1-20.el9_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.aarch64"
},
"product_reference": "389-ds-base-0:2.6.1-20.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.6.1-20.el9_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.ppc64le"
},
"product_reference": "389-ds-base-0:2.6.1-20.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.6.1-20.el9_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.s390x"
},
"product_reference": "389-ds-base-0:2.6.1-20.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.6.1-20.el9_6.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.src"
},
"product_reference": "389-ds-base-0:2.6.1-20.el9_6.src",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.6.1-20.el9_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.x86_64"
},
"product_reference": "389-ds-base-0:2.6.1-20.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.aarch64"
},
"product_reference": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.ppc64le"
},
"product_reference": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.s390x"
},
"product_reference": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.x86_64"
},
"product_reference": "389-ds-base-debuginfo-0:2.6.1-20.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.6.1-20.el9_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.aarch64"
},
"product_reference": "389-ds-base-debugsource-0:2.6.1-20.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.6.1-20.el9_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.ppc64le"
},
"product_reference": "389-ds-base-debugsource-0:2.6.1-20.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.6.1-20.el9_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.s390x"
},
"product_reference": "389-ds-base-debugsource-0:2.6.1-20.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.6.1-20.el9_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.x86_64"
},
"product_reference": "389-ds-base-debugsource-0:2.6.1-20.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.6.1-20.el9_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.aarch64"
},
"product_reference": "389-ds-base-devel-0:2.6.1-20.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.6.1-20.el9_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.ppc64le"
},
"product_reference": "389-ds-base-devel-0:2.6.1-20.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.6.1-20.el9_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.s390x"
},
"product_reference": "389-ds-base-devel-0:2.6.1-20.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.6.1-20.el9_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.x86_64"
},
"product_reference": "389-ds-base-devel-0:2.6.1-20.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.6.1-20.el9_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.aarch64"
},
"product_reference": "389-ds-base-libs-0:2.6.1-20.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.6.1-20.el9_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.ppc64le"
},
"product_reference": "389-ds-base-libs-0:2.6.1-20.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.6.1-20.el9_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.s390x"
},
"product_reference": "389-ds-base-libs-0:2.6.1-20.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.6.1-20.el9_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.x86_64"
},
"product_reference": "389-ds-base-libs-0:2.6.1-20.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.aarch64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.ppc64le"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.s390x"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.x86_64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.6.1-20.el9_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.aarch64"
},
"product_reference": "389-ds-base-snmp-0:2.6.1-20.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.6.1-20.el9_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.ppc64le"
},
"product_reference": "389-ds-base-snmp-0:2.6.1-20.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.6.1-20.el9_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.s390x"
},
"product_reference": "389-ds-base-snmp-0:2.6.1-20.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.6.1-20.el9_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.x86_64"
},
"product_reference": "389-ds-base-snmp-0:2.6.1-20.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.aarch64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.ppc64le"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.s390x"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.x86_64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:2.6.1-20.el9_6.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:python3-lib389-0:2.6.1-20.el9_6.noarch"
},
"product_reference": "python3-lib389-0:2.6.1-20.el9_6.noarch",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-14905",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-12-18T18:04:56.621000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423624"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Directory Server. A heap buffer overflow in the `389-ds-base` component can lead to a denial of service or potential remote code execution. Exploitation requires high privileges on the Directory Server, limiting the attack surface to authenticated administrative users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.src",
"AppStream-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:python3-lib389-0:2.6.1-20.el9_6.noarch",
"CRB-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.src",
"CRB-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:python3-lib389-0:2.6.1-20.el9_6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "RHBZ#2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905"
}
],
"release_date": "2026-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T22:08:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.src",
"AppStream-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:python3-lib389-0:2.6.1-20.el9_6.noarch",
"CRB-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.src",
"CRB-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:python3-lib389-0:2.6.1-20.el9_6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4207"
},
{
"category": "workaround",
"details": "Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.",
"product_ids": [
"AppStream-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.src",
"AppStream-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:python3-lib389-0:2.6.1-20.el9_6.noarch",
"CRB-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.src",
"CRB-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:python3-lib389-0:2.6.1-20.el9_6.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.src",
"AppStream-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:python3-lib389-0:2.6.1-20.el9_6.noarch",
"CRB-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.src",
"CRB-9.6.0.Z.EUS:389-ds-base-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-debuginfo-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-debugsource-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-devel-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.s390x",
"CRB-9.6.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.6.1-20.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:python3-lib389-0:2.6.1-20.el9_6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow"
}
]
}
RHSA-2026:3208
Vulnerability from csaf_redhat - Published: 2026-02-24 13:53 - Updated: 2026-03-31 17:24A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for 389-ds-base is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.\n\nSecurity Fix(es):\n\n* 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3208",
"url": "https://access.redhat.com/errata/RHSA-2026:3208"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3208.json"
}
],
"title": "Red Hat Security Advisory: 389-ds-base security update",
"tracking": {
"current_release_date": "2026-03-31T17:24:13+00:00",
"generator": {
"date": "2026-03-31T17:24:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:3208",
"initial_release_date": "2026-02-24T13:53:17+00:00",
"revision_history": [
{
"date": "2026-02-24T13:53:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-24T13:53:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-31T17:24:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:3.1.3-7.el10_1.src",
"product": {
"name": "389-ds-base-0:3.1.3-7.el10_1.src",
"product_id": "389-ds-base-0:3.1.3-7.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@3.1.3-7.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:3.1.3-7.el10_1.aarch64",
"product": {
"name": "389-ds-base-0:3.1.3-7.el10_1.aarch64",
"product_id": "389-ds-base-0:3.1.3-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@3.1.3-7.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"product": {
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"product_id": "389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@3.1.3-7.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"product": {
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"product_id": "389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@3.1.3-7.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"product": {
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"product_id": "389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@3.1.3-7.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"product": {
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"product_id": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-bdb-debuginfo@3.1.3-7.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"product": {
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"product_id": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@3.1.3-7.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"product": {
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"product_id": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@3.1.3-7.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"product_id": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@3.1.3-7.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"product": {
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"product_id": "389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-bdb@3.1.3-7.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"product": {
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"product_id": "389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@3.1.3-7.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"product": {
"name": "389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"product_id": "389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@3.1.3-7.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"product": {
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"product_id": "389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@3.1.3-7.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"product": {
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"product_id": "389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@3.1.3-7.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"product": {
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"product_id": "389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@3.1.3-7.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"product": {
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"product_id": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-bdb-debuginfo@3.1.3-7.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"product": {
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"product_id": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@3.1.3-7.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"product": {
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"product_id": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@3.1.3-7.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"product_id": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@3.1.3-7.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"product": {
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"product_id": "389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-bdb@3.1.3-7.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"product": {
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"product_id": "389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@3.1.3-7.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:3.1.3-7.el10_1.x86_64",
"product": {
"name": "389-ds-base-0:3.1.3-7.el10_1.x86_64",
"product_id": "389-ds-base-0:3.1.3-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@3.1.3-7.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"product": {
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"product_id": "389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@3.1.3-7.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"product": {
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"product_id": "389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@3.1.3-7.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"product": {
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"product_id": "389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@3.1.3-7.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"product": {
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"product_id": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-bdb-debuginfo@3.1.3-7.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"product": {
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"product_id": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@3.1.3-7.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"product": {
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"product_id": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@3.1.3-7.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"product_id": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@3.1.3-7.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"product": {
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"product_id": "389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-bdb@3.1.3-7.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"product": {
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"product_id": "389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@3.1.3-7.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:3.1.3-7.el10_1.s390x",
"product": {
"name": "389-ds-base-0:3.1.3-7.el10_1.s390x",
"product_id": "389-ds-base-0:3.1.3-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@3.1.3-7.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"product": {
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"product_id": "389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@3.1.3-7.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"product": {
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"product_id": "389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@3.1.3-7.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"product": {
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"product_id": "389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@3.1.3-7.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"product": {
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"product_id": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-bdb-debuginfo@3.1.3-7.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"product": {
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"product_id": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@3.1.3-7.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"product": {
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"product_id": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@3.1.3-7.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"product_id": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@3.1.3-7.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"product": {
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"product_id": "389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-bdb@3.1.3-7.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"product": {
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"product_id": "389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@3.1.3-7.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-lib389-0:3.1.3-7.el10_1.noarch",
"product": {
"name": "python3-lib389-0:3.1.3-7.el10_1.noarch",
"product_id": "python3-lib389-0:3.1.3-7.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-lib389@3.1.3-7.el10_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.1.3-7.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.src"
},
"product_reference": "389-ds-base-0:3.1.3-7.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:3.1.3-7.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-lib389-0:3.1.3-7.el10_1.noarch"
},
"product_reference": "python3-lib389-0:3.1.3-7.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.1.3-7.el10_1.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.src"
},
"product_reference": "389-ds-base-0:3.1.3-7.el10_1.src",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:3.1.3-7.el10_1.noarch as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:python3-lib389-0:3.1.3-7.el10_1.noarch"
},
"product_reference": "python3-lib389-0:3.1.3-7.el10_1.noarch",
"relates_to_product_reference": "CRB-10.1.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-14905",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-12-18T18:04:56.621000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423624"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Directory Server. A heap buffer overflow in the `389-ds-base` component can lead to a denial of service or potential remote code execution. Exploitation requires high privileges on the Directory Server, limiting the attack surface to authenticated administrative users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.src",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:python3-lib389-0:3.1.3-7.el10_1.noarch",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.src",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:python3-lib389-0:3.1.3-7.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "RHBZ#2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905"
}
],
"release_date": "2026-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T13:53:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.src",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:python3-lib389-0:3.1.3-7.el10_1.noarch",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.src",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:python3-lib389-0:3.1.3-7.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3208"
},
{
"category": "workaround",
"details": "Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.",
"product_ids": [
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.src",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:python3-lib389-0:3.1.3-7.el10_1.noarch",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.src",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:python3-lib389-0:3.1.3-7.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.src",
"AppStream-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"AppStream-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"AppStream-10.1.Z:python3-lib389-0:3.1.3-7.el10_1.noarch",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.src",
"CRB-10.1.Z:389-ds-base-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-bdb-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-bdb-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-debugsource-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-devel-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-libs-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-libs-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-snmp-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.aarch64",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.ppc64le",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.s390x",
"CRB-10.1.Z:389-ds-base-snmp-debuginfo-0:3.1.3-7.el10_1.x86_64",
"CRB-10.1.Z:python3-lib389-0:3.1.3-7.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow"
}
]
}
RHSA-2026:4720
Vulnerability from csaf_redhat - Published: 2026-03-17 10:48 - Updated: 2026-03-31 17:24A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for 389-ds-base is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.\n\nSecurity Fix(es):\n\n* 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:4720",
"url": "https://access.redhat.com/errata/RHSA-2026:4720"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_4720.json"
}
],
"title": "Red Hat Security Advisory: 389-ds-base security update",
"tracking": {
"current_release_date": "2026-03-31T17:24:17+00:00",
"generator": {
"date": "2026-03-31T17:24:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:4720",
"initial_release_date": "2026-03-17T10:48:47+00:00",
"revision_history": [
{
"date": "2026-03-17T10:48:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-17T10:48:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-31T17:24:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.4::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.4.5-24.el9_4.src",
"product": {
"name": "389-ds-base-0:2.4.5-24.el9_4.src",
"product_id": "389-ds-base-0:2.4.5-24.el9_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.4.5-24.el9_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.4.5-24.el9_4.aarch64",
"product": {
"name": "389-ds-base-0:2.4.5-24.el9_4.aarch64",
"product_id": "389-ds-base-0:2.4.5-24.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.4.5-24.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.4.5-24.el9_4.aarch64",
"product": {
"name": "389-ds-base-libs-0:2.4.5-24.el9_4.aarch64",
"product_id": "389-ds-base-libs-0:2.4.5-24.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.4.5-24.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.4.5-24.el9_4.aarch64",
"product": {
"name": "389-ds-base-debugsource-0:2.4.5-24.el9_4.aarch64",
"product_id": "389-ds-base-debugsource-0:2.4.5-24.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.4.5-24.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.aarch64",
"product": {
"name": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.aarch64",
"product_id": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.4.5-24.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.aarch64",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.aarch64",
"product_id": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.4.5-24.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.aarch64",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.aarch64",
"product_id": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.4.5-24.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:2.4.5-24.el9_4.aarch64",
"product": {
"name": "389-ds-base-devel-0:2.4.5-24.el9_4.aarch64",
"product_id": "389-ds-base-devel-0:2.4.5-24.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@2.4.5-24.el9_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.4.5-24.el9_4.ppc64le",
"product": {
"name": "389-ds-base-0:2.4.5-24.el9_4.ppc64le",
"product_id": "389-ds-base-0:2.4.5-24.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.4.5-24.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.4.5-24.el9_4.ppc64le",
"product": {
"name": "389-ds-base-libs-0:2.4.5-24.el9_4.ppc64le",
"product_id": "389-ds-base-libs-0:2.4.5-24.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.4.5-24.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.4.5-24.el9_4.ppc64le",
"product": {
"name": "389-ds-base-debugsource-0:2.4.5-24.el9_4.ppc64le",
"product_id": "389-ds-base-debugsource-0:2.4.5-24.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.4.5-24.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"product": {
"name": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"product_id": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.4.5-24.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"product_id": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.4.5-24.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"product_id": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.4.5-24.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:2.4.5-24.el9_4.ppc64le",
"product": {
"name": "389-ds-base-devel-0:2.4.5-24.el9_4.ppc64le",
"product_id": "389-ds-base-devel-0:2.4.5-24.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@2.4.5-24.el9_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.4.5-24.el9_4.x86_64",
"product": {
"name": "389-ds-base-0:2.4.5-24.el9_4.x86_64",
"product_id": "389-ds-base-0:2.4.5-24.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.4.5-24.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.4.5-24.el9_4.x86_64",
"product": {
"name": "389-ds-base-libs-0:2.4.5-24.el9_4.x86_64",
"product_id": "389-ds-base-libs-0:2.4.5-24.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.4.5-24.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.4.5-24.el9_4.x86_64",
"product": {
"name": "389-ds-base-debugsource-0:2.4.5-24.el9_4.x86_64",
"product_id": "389-ds-base-debugsource-0:2.4.5-24.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.4.5-24.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.x86_64",
"product": {
"name": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.x86_64",
"product_id": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.4.5-24.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.x86_64",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.x86_64",
"product_id": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.4.5-24.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.x86_64",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.x86_64",
"product_id": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.4.5-24.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:2.4.5-24.el9_4.x86_64",
"product": {
"name": "389-ds-base-devel-0:2.4.5-24.el9_4.x86_64",
"product_id": "389-ds-base-devel-0:2.4.5-24.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@2.4.5-24.el9_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.4.5-24.el9_4.s390x",
"product": {
"name": "389-ds-base-0:2.4.5-24.el9_4.s390x",
"product_id": "389-ds-base-0:2.4.5-24.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.4.5-24.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.4.5-24.el9_4.s390x",
"product": {
"name": "389-ds-base-libs-0:2.4.5-24.el9_4.s390x",
"product_id": "389-ds-base-libs-0:2.4.5-24.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.4.5-24.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.4.5-24.el9_4.s390x",
"product": {
"name": "389-ds-base-debugsource-0:2.4.5-24.el9_4.s390x",
"product_id": "389-ds-base-debugsource-0:2.4.5-24.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.4.5-24.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.s390x",
"product": {
"name": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.s390x",
"product_id": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.4.5-24.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.s390x",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.s390x",
"product_id": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.4.5-24.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.s390x",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.s390x",
"product_id": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.4.5-24.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:2.4.5-24.el9_4.s390x",
"product": {
"name": "389-ds-base-devel-0:2.4.5-24.el9_4.s390x",
"product_id": "389-ds-base-devel-0:2.4.5-24.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@2.4.5-24.el9_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-lib389-0:2.4.5-24.el9_4.noarch",
"product": {
"name": "python3-lib389-0:2.4.5-24.el9_4.noarch",
"product_id": "python3-lib389-0:2.4.5-24.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-lib389@2.4.5-24.el9_4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.4.5-24.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.aarch64"
},
"product_reference": "389-ds-base-0:2.4.5-24.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.4.5-24.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.ppc64le"
},
"product_reference": "389-ds-base-0:2.4.5-24.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.4.5-24.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.s390x"
},
"product_reference": "389-ds-base-0:2.4.5-24.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.4.5-24.el9_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.src"
},
"product_reference": "389-ds-base-0:2.4.5-24.el9_4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.4.5-24.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.x86_64"
},
"product_reference": "389-ds-base-0:2.4.5-24.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.aarch64"
},
"product_reference": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.ppc64le"
},
"product_reference": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.s390x"
},
"product_reference": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.x86_64"
},
"product_reference": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.4.5-24.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.aarch64"
},
"product_reference": "389-ds-base-debugsource-0:2.4.5-24.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.4.5-24.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.ppc64le"
},
"product_reference": "389-ds-base-debugsource-0:2.4.5-24.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.4.5-24.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.s390x"
},
"product_reference": "389-ds-base-debugsource-0:2.4.5-24.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.4.5-24.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.x86_64"
},
"product_reference": "389-ds-base-debugsource-0:2.4.5-24.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.4.5-24.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.aarch64"
},
"product_reference": "389-ds-base-devel-0:2.4.5-24.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.4.5-24.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.ppc64le"
},
"product_reference": "389-ds-base-devel-0:2.4.5-24.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.4.5-24.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.s390x"
},
"product_reference": "389-ds-base-devel-0:2.4.5-24.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.4.5-24.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.x86_64"
},
"product_reference": "389-ds-base-devel-0:2.4.5-24.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.4.5-24.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.aarch64"
},
"product_reference": "389-ds-base-libs-0:2.4.5-24.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.4.5-24.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.ppc64le"
},
"product_reference": "389-ds-base-libs-0:2.4.5-24.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.4.5-24.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.s390x"
},
"product_reference": "389-ds-base-libs-0:2.4.5-24.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.4.5-24.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.x86_64"
},
"product_reference": "389-ds-base-libs-0:2.4.5-24.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.aarch64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.ppc64le"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.s390x"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.x86_64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.aarch64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.ppc64le"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.s390x"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.x86_64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:2.4.5-24.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:python3-lib389-0:2.4.5-24.el9_4.noarch"
},
"product_reference": "python3-lib389-0:2.4.5-24.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.4.5-24.el9_4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.aarch64"
},
"product_reference": "389-ds-base-0:2.4.5-24.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.4.5-24.el9_4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.ppc64le"
},
"product_reference": "389-ds-base-0:2.4.5-24.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.4.5-24.el9_4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.s390x"
},
"product_reference": "389-ds-base-0:2.4.5-24.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.4.5-24.el9_4.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.src"
},
"product_reference": "389-ds-base-0:2.4.5-24.el9_4.src",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.4.5-24.el9_4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.x86_64"
},
"product_reference": "389-ds-base-0:2.4.5-24.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.aarch64"
},
"product_reference": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.ppc64le"
},
"product_reference": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.s390x"
},
"product_reference": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.x86_64"
},
"product_reference": "389-ds-base-debuginfo-0:2.4.5-24.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.4.5-24.el9_4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.aarch64"
},
"product_reference": "389-ds-base-debugsource-0:2.4.5-24.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.4.5-24.el9_4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.ppc64le"
},
"product_reference": "389-ds-base-debugsource-0:2.4.5-24.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.4.5-24.el9_4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.s390x"
},
"product_reference": "389-ds-base-debugsource-0:2.4.5-24.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.4.5-24.el9_4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.x86_64"
},
"product_reference": "389-ds-base-debugsource-0:2.4.5-24.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.4.5-24.el9_4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.aarch64"
},
"product_reference": "389-ds-base-devel-0:2.4.5-24.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.4.5-24.el9_4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.ppc64le"
},
"product_reference": "389-ds-base-devel-0:2.4.5-24.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.4.5-24.el9_4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.s390x"
},
"product_reference": "389-ds-base-devel-0:2.4.5-24.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.4.5-24.el9_4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.x86_64"
},
"product_reference": "389-ds-base-devel-0:2.4.5-24.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.4.5-24.el9_4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.aarch64"
},
"product_reference": "389-ds-base-libs-0:2.4.5-24.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.4.5-24.el9_4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.ppc64le"
},
"product_reference": "389-ds-base-libs-0:2.4.5-24.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.4.5-24.el9_4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.s390x"
},
"product_reference": "389-ds-base-libs-0:2.4.5-24.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.4.5-24.el9_4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.x86_64"
},
"product_reference": "389-ds-base-libs-0:2.4.5-24.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.aarch64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.ppc64le"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.s390x"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.x86_64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.aarch64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.ppc64le"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.s390x"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.x86_64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:2.4.5-24.el9_4.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:python3-lib389-0:2.4.5-24.el9_4.noarch"
},
"product_reference": "python3-lib389-0:2.4.5-24.el9_4.noarch",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-14905",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-12-18T18:04:56.621000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423624"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Directory Server. A heap buffer overflow in the `389-ds-base` component can lead to a denial of service or potential remote code execution. Exploitation requires high privileges on the Directory Server, limiting the attack surface to authenticated administrative users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.src",
"AppStream-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-lib389-0:2.4.5-24.el9_4.noarch",
"CRB-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.src",
"CRB-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:python3-lib389-0:2.4.5-24.el9_4.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "RHBZ#2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905"
}
],
"release_date": "2026-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-17T10:48:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.src",
"AppStream-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-lib389-0:2.4.5-24.el9_4.noarch",
"CRB-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.src",
"CRB-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:python3-lib389-0:2.4.5-24.el9_4.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4720"
},
{
"category": "workaround",
"details": "Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.",
"product_ids": [
"AppStream-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.src",
"AppStream-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-lib389-0:2.4.5-24.el9_4.noarch",
"CRB-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.src",
"CRB-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:python3-lib389-0:2.4.5-24.el9_4.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.src",
"AppStream-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-lib389-0:2.4.5-24.el9_4.noarch",
"CRB-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.src",
"CRB-9.4.0.Z.EUS:389-ds-base-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-debuginfo-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-debugsource-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-devel-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-libs-debuginfo-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.s390x",
"CRB-9.4.0.Z.EUS:389-ds-base-snmp-debuginfo-0:2.4.5-24.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:python3-lib389-0:2.4.5-24.el9_4.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow"
}
]
}
RHSA-2026:5196
Vulnerability from csaf_redhat - Published: 2026-03-23 00:20 - Updated: 2026-03-31 17:31A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the 389-ds:1.4 module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. \n\nSecurity Fix(es):\n\n* 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:5196",
"url": "https://access.redhat.com/errata/RHSA-2026:5196"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_5196.json"
}
],
"title": "Red Hat Security Advisory: 389-ds:1.4 security update",
"tracking": {
"current_release_date": "2026-03-31T17:31:28+00:00",
"generator": {
"date": "2026-03-31T17:31:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:5196",
"initial_release_date": "2026-03-23T00:20:16+00:00",
"revision_history": [
{
"date": "2026-03-23T00:20:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-23T00:20:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-31T17:31:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.src::389-ds:1.4",
"product": {
"name": "389-ds-base-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.src (389-ds:1.4)",
"product_id": "389-ds-base-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.src::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.4.2.4-19.module%2Bel8.2.0%2B24058%2Bed9808c7?arch=src\u0026rpmmod=389-ds:1.4:8020020260303204738:dbc46ba7"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.4.2.4-19.module%2Bel8.2.0%2B24058%2Bed9808c7?arch=x86_64\u0026rpmmod=389-ds:1.4:8020020260303204738:dbc46ba7"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@1.4.2.4-19.module%2Bel8.2.0%2B24058%2Bed9808c7?arch=x86_64\u0026rpmmod=389-ds:1.4:8020020260303204738:dbc46ba7"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-debugsource-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-debugsource-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@1.4.2.4-19.module%2Bel8.2.0%2B24058%2Bed9808c7?arch=x86_64\u0026rpmmod=389-ds:1.4:8020020260303204738:dbc46ba7"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-devel-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-devel-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@1.4.2.4-19.module%2Bel8.2.0%2B24058%2Bed9808c7?arch=x86_64\u0026rpmmod=389-ds:1.4:8020020260303204738:dbc46ba7"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-legacy-tools-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-legacy-tools-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools@1.4.2.4-19.module%2Bel8.2.0%2B24058%2Bed9808c7?arch=x86_64\u0026rpmmod=389-ds:1.4:8020020260303204738:dbc46ba7"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-legacy-tools-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools-debuginfo@1.4.2.4-19.module%2Bel8.2.0%2B24058%2Bed9808c7?arch=x86_64\u0026rpmmod=389-ds:1.4:8020020260303204738:dbc46ba7"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-libs-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-libs-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@1.4.2.4-19.module%2Bel8.2.0%2B24058%2Bed9808c7?arch=x86_64\u0026rpmmod=389-ds:1.4:8020020260303204738:dbc46ba7"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-libs-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-libs-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@1.4.2.4-19.module%2Bel8.2.0%2B24058%2Bed9808c7?arch=x86_64\u0026rpmmod=389-ds:1.4:8020020260303204738:dbc46ba7"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-snmp-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-snmp-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@1.4.2.4-19.module%2Bel8.2.0%2B24058%2Bed9808c7?arch=x86_64\u0026rpmmod=389-ds:1.4:8020020260303204738:dbc46ba7"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-snmp-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@1.4.2.4-19.module%2Bel8.2.0%2B24058%2Bed9808c7?arch=x86_64\u0026rpmmod=389-ds:1.4:8020020260303204738:dbc46ba7"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-lib389-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.noarch::389-ds:1.4",
"product": {
"name": "python3-lib389-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.noarch (389-ds:1.4)",
"product_id": "python3-lib389-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.noarch::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-lib389@1.4.2.4-19.module%2Bel8.2.0%2B24058%2Bed9808c7?arch=noarch\u0026rpmmod=389-ds:1.4:8020020260303204738:dbc46ba7"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.src (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:389-ds-base-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.src::389-ds:1.4"
},
"product_reference": "389-ds-base-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.src::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:389-ds-base-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:389-ds-base-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:389-ds-base-debugsource-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-debugsource-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:389-ds-base-devel-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-devel-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:389-ds-base-legacy-tools-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:389-ds-base-legacy-tools-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:389-ds-base-libs-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:389-ds-base-libs-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:389-ds-base-snmp-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:389-ds-base-snmp-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.noarch (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:python3-lib389-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.noarch::389-ds:1.4"
},
"product_reference": "python3-lib389-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.noarch::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-14905",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-12-18T18:04:56.621000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423624"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Directory Server. A heap buffer overflow in the `389-ds-base` component can lead to a denial of service or potential remote code execution. Exploitation requires high privileges on the Directory Server, limiting the attack surface to authenticated administrative users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:389-ds-base-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.src::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-debugsource-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-devel-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-legacy-tools-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-legacy-tools-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-libs-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-libs-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-snmp-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-snmp-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:python3-lib389-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.noarch::389-ds:1.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "RHBZ#2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905"
}
],
"release_date": "2026-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-23T00:20:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:389-ds-base-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.src::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-debugsource-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-devel-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-legacy-tools-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-legacy-tools-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-libs-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-libs-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-snmp-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-snmp-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:python3-lib389-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.noarch::389-ds:1.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5196"
},
{
"category": "workaround",
"details": "Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:389-ds-base-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.src::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-debugsource-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-devel-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-legacy-tools-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-legacy-tools-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-libs-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-libs-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-snmp-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-snmp-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:python3-lib389-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.noarch::389-ds:1.4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:389-ds-base-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.src::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-debugsource-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-devel-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-legacy-tools-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-legacy-tools-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-libs-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-libs-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-snmp-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:389-ds-base-snmp-debuginfo-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.x86_64::389-ds:1.4",
"AppStream-8.2.0.Z.AUS:python3-lib389-0:1.4.2.4-19.module+el8.2.0+24058+ed9808c7.noarch::389-ds:1.4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow"
}
]
}
RHSA-2026:4661
Vulnerability from csaf_redhat - Published: 2026-03-17 00:17 - Updated: 2026-03-31 17:28A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the redhat-ds:12 module is now available for Red Hat Directory Server 12.4 EUS for RHEL 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Directory Server is an LDAPv3-compliant directory server. The suite of packages includes the Lightweight Directory Access Protocol (LDAP) server, as well as command-line utilities and Web UI packages for server administration.\n\nSecurity Fix(es):\n\n* 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:4661",
"url": "https://access.redhat.com/errata/RHSA-2026:4661"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_4661.json"
}
],
"title": "Red Hat Security Advisory: redhat-ds:12 security update",
"tracking": {
"current_release_date": "2026-03-31T17:28:45+00:00",
"generator": {
"date": "2026-03-31T17:28:45+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:4661",
"initial_release_date": "2026-03-17T00:17:20+00:00",
"revision_history": [
{
"date": "2026-03-17T00:17:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-17T00:17:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-31T17:28:45+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Directory Server 12.4 EUS for RHEL 9",
"product": {
"name": "Red Hat Directory Server 12.4 EUS for RHEL 9",
"product_id": "BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:directory_server_eus:12.4::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Directory Server"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.4.5-22.module+el9dsrv+24021+288fb6da.src::redhat-ds:12",
"product": {
"name": "389-ds-base-0:2.4.5-22.module+el9dsrv+24021+288fb6da.src (redhat-ds:12)",
"product_id": "389-ds-base-0:2.4.5-22.module+el9dsrv+24021+288fb6da.src::redhat-ds:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.4.5-22.module%2Bel9dsrv%2B24021%2B288fb6da?arch=src\u0026rpmmod=redhat-ds:12:9040020260225135630:1674d574"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"product": {
"name": "389-ds-base-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64 (redhat-ds:12)",
"product_id": "389-ds-base-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.4.5-22.module%2Bel9dsrv%2B24021%2B288fb6da?arch=x86_64\u0026rpmmod=redhat-ds:12:9040020260225135630:1674d574"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"product": {
"name": "389-ds-base-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64 (redhat-ds:12)",
"product_id": "389-ds-base-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.4.5-22.module%2Bel9dsrv%2B24021%2B288fb6da?arch=x86_64\u0026rpmmod=redhat-ds:12:9040020260225135630:1674d574"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"product": {
"name": "389-ds-base-debugsource-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64 (redhat-ds:12)",
"product_id": "389-ds-base-debugsource-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.4.5-22.module%2Bel9dsrv%2B24021%2B288fb6da?arch=x86_64\u0026rpmmod=redhat-ds:12:9040020260225135630:1674d574"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"product": {
"name": "389-ds-base-devel-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64 (redhat-ds:12)",
"product_id": "389-ds-base-devel-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@2.4.5-22.module%2Bel9dsrv%2B24021%2B288fb6da?arch=x86_64\u0026rpmmod=redhat-ds:12:9040020260225135630:1674d574"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"product": {
"name": "389-ds-base-libs-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64 (redhat-ds:12)",
"product_id": "389-ds-base-libs-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.4.5-22.module%2Bel9dsrv%2B24021%2B288fb6da?arch=x86_64\u0026rpmmod=redhat-ds:12:9040020260225135630:1674d574"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64 (redhat-ds:12)",
"product_id": "389-ds-base-libs-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.4.5-22.module%2Bel9dsrv%2B24021%2B288fb6da?arch=x86_64\u0026rpmmod=redhat-ds:12:9040020260225135630:1674d574"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"product": {
"name": "389-ds-base-snmp-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64 (redhat-ds:12)",
"product_id": "389-ds-base-snmp-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@2.4.5-22.module%2Bel9dsrv%2B24021%2B288fb6da?arch=x86_64\u0026rpmmod=redhat-ds:12:9040020260225135630:1674d574"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64 (redhat-ds:12)",
"product_id": "389-ds-base-snmp-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.4.5-22.module%2Bel9dsrv%2B24021%2B288fb6da?arch=x86_64\u0026rpmmod=redhat-ds:12:9040020260225135630:1674d574"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "cockpit-389-ds-0:2.4.5-22.module+el9dsrv+24021+288fb6da.noarch::redhat-ds:12",
"product": {
"name": "cockpit-389-ds-0:2.4.5-22.module+el9dsrv+24021+288fb6da.noarch (redhat-ds:12)",
"product_id": "cockpit-389-ds-0:2.4.5-22.module+el9dsrv+24021+288fb6da.noarch::redhat-ds:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cockpit-389-ds@2.4.5-22.module%2Bel9dsrv%2B24021%2B288fb6da?arch=noarch\u0026rpmmod=redhat-ds:12:9040020260225135630:1674d574"
}
}
},
{
"category": "product_version",
"name": "python3-lib389-0:2.4.5-22.module+el9dsrv+24021+288fb6da.noarch::redhat-ds:12",
"product": {
"name": "python3-lib389-0:2.4.5-22.module+el9dsrv+24021+288fb6da.noarch (redhat-ds:12)",
"product_id": "python3-lib389-0:2.4.5-22.module+el9dsrv+24021+288fb6da.noarch::redhat-ds:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-lib389@2.4.5-22.module%2Bel9dsrv%2B24021%2B288fb6da?arch=noarch\u0026rpmmod=redhat-ds:12:9040020260225135630:1674d574"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.4.5-22.module+el9dsrv+24021+288fb6da.src (redhat-ds:12) as a component of Red Hat Directory Server 12.4 EUS for RHEL 9",
"product_id": "BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-0:2.4.5-22.module+el9dsrv+24021+288fb6da.src::redhat-ds:12"
},
"product_reference": "389-ds-base-0:2.4.5-22.module+el9dsrv+24021+288fb6da.src::redhat-ds:12",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64 (redhat-ds:12) as a component of Red Hat Directory Server 12.4 EUS for RHEL 9",
"product_id": "BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12"
},
"product_reference": "389-ds-base-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64 (redhat-ds:12) as a component of Red Hat Directory Server 12.4 EUS for RHEL 9",
"product_id": "BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12"
},
"product_reference": "389-ds-base-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64 (redhat-ds:12) as a component of Red Hat Directory Server 12.4 EUS for RHEL 9",
"product_id": "BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-debugsource-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12"
},
"product_reference": "389-ds-base-debugsource-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64 (redhat-ds:12) as a component of Red Hat Directory Server 12.4 EUS for RHEL 9",
"product_id": "BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-devel-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12"
},
"product_reference": "389-ds-base-devel-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64 (redhat-ds:12) as a component of Red Hat Directory Server 12.4 EUS for RHEL 9",
"product_id": "BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-libs-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12"
},
"product_reference": "389-ds-base-libs-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64 (redhat-ds:12) as a component of Red Hat Directory Server 12.4 EUS for RHEL 9",
"product_id": "BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-libs-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64 (redhat-ds:12) as a component of Red Hat Directory Server 12.4 EUS for RHEL 9",
"product_id": "BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-snmp-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12"
},
"product_reference": "389-ds-base-snmp-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64 (redhat-ds:12) as a component of Red Hat Directory Server 12.4 EUS for RHEL 9",
"product_id": "BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-snmp-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-389-ds-0:2.4.5-22.module+el9dsrv+24021+288fb6da.noarch (redhat-ds:12) as a component of Red Hat Directory Server 12.4 EUS for RHEL 9",
"product_id": "BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:cockpit-389-ds-0:2.4.5-22.module+el9dsrv+24021+288fb6da.noarch::redhat-ds:12"
},
"product_reference": "cockpit-389-ds-0:2.4.5-22.module+el9dsrv+24021+288fb6da.noarch::redhat-ds:12",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:2.4.5-22.module+el9dsrv+24021+288fb6da.noarch (redhat-ds:12) as a component of Red Hat Directory Server 12.4 EUS for RHEL 9",
"product_id": "BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:python3-lib389-0:2.4.5-22.module+el9dsrv+24021+288fb6da.noarch::redhat-ds:12"
},
"product_reference": "python3-lib389-0:2.4.5-22.module+el9dsrv+24021+288fb6da.noarch::redhat-ds:12",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-14905",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-12-18T18:04:56.621000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423624"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Directory Server. A heap buffer overflow in the `389-ds-base` component can lead to a denial of service or potential remote code execution. Exploitation requires high privileges on the Directory Server, limiting the attack surface to authenticated administrative users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-0:2.4.5-22.module+el9dsrv+24021+288fb6da.src::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-debugsource-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-devel-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-libs-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-libs-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-snmp-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-snmp-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:cockpit-389-ds-0:2.4.5-22.module+el9dsrv+24021+288fb6da.noarch::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:python3-lib389-0:2.4.5-22.module+el9dsrv+24021+288fb6da.noarch::redhat-ds:12"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "RHBZ#2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905"
}
],
"release_date": "2026-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-17T00:17:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-0:2.4.5-22.module+el9dsrv+24021+288fb6da.src::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-debugsource-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-devel-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-libs-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-libs-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-snmp-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-snmp-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:cockpit-389-ds-0:2.4.5-22.module+el9dsrv+24021+288fb6da.noarch::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:python3-lib389-0:2.4.5-22.module+el9dsrv+24021+288fb6da.noarch::redhat-ds:12"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4661"
},
{
"category": "workaround",
"details": "Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.",
"product_ids": [
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-0:2.4.5-22.module+el9dsrv+24021+288fb6da.src::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-debugsource-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-devel-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-libs-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-libs-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-snmp-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-snmp-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:cockpit-389-ds-0:2.4.5-22.module+el9dsrv+24021+288fb6da.noarch::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:python3-lib389-0:2.4.5-22.module+el9dsrv+24021+288fb6da.noarch::redhat-ds:12"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-0:2.4.5-22.module+el9dsrv+24021+288fb6da.src::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-debugsource-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-devel-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-libs-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-libs-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-snmp-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:389-ds-base-snmp-debuginfo-0:2.4.5-22.module+el9dsrv+24021+288fb6da.x86_64::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:cockpit-389-ds-0:2.4.5-22.module+el9dsrv+24021+288fb6da.noarch::redhat-ds:12",
"BaseOS-9.4.0.Z.EUS-DirSrv-12.4-EUS:python3-lib389-0:2.4.5-22.module+el9dsrv+24021+288fb6da.noarch::redhat-ds:12"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow"
}
]
}
RHSA-2026:5597
Vulnerability from csaf_redhat - Published: 2026-03-24 10:03 - Updated: 2026-03-31 17:28A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for 389-ds-base is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.\n\nSecurity Fix(es):\n\n* 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:5597",
"url": "https://access.redhat.com/errata/RHSA-2026:5597"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_5597.json"
}
],
"title": "Red Hat Security Advisory: 389-ds-base security update",
"tracking": {
"current_release_date": "2026-03-31T17:28:46+00:00",
"generator": {
"date": "2026-03-31T17:28:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:5597",
"initial_release_date": "2026-03-24T10:03:12+00:00",
"revision_history": [
{
"date": "2026-03-24T10:03:12+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-24T10:03:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-31T17:28:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.0.14-5.el9_0.src",
"product": {
"name": "389-ds-base-0:2.0.14-5.el9_0.src",
"product_id": "389-ds-base-0:2.0.14-5.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.0.14-5.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.0.14-5.el9_0.aarch64",
"product": {
"name": "389-ds-base-0:2.0.14-5.el9_0.aarch64",
"product_id": "389-ds-base-0:2.0.14-5.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.0.14-5.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.0.14-5.el9_0.aarch64",
"product": {
"name": "389-ds-base-libs-0:2.0.14-5.el9_0.aarch64",
"product_id": "389-ds-base-libs-0:2.0.14-5.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.0.14-5.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.0.14-5.el9_0.aarch64",
"product": {
"name": "389-ds-base-debugsource-0:2.0.14-5.el9_0.aarch64",
"product_id": "389-ds-base-debugsource-0:2.0.14-5.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.0.14-5.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.0.14-5.el9_0.aarch64",
"product": {
"name": "389-ds-base-debuginfo-0:2.0.14-5.el9_0.aarch64",
"product_id": "389-ds-base-debuginfo-0:2.0.14-5.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.0.14-5.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.aarch64",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.aarch64",
"product_id": "389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.0.14-5.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.aarch64",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.aarch64",
"product_id": "389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.0.14-5.el9_0?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.0.14-5.el9_0.ppc64le",
"product": {
"name": "389-ds-base-0:2.0.14-5.el9_0.ppc64le",
"product_id": "389-ds-base-0:2.0.14-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.0.14-5.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.0.14-5.el9_0.ppc64le",
"product": {
"name": "389-ds-base-libs-0:2.0.14-5.el9_0.ppc64le",
"product_id": "389-ds-base-libs-0:2.0.14-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.0.14-5.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.0.14-5.el9_0.ppc64le",
"product": {
"name": "389-ds-base-debugsource-0:2.0.14-5.el9_0.ppc64le",
"product_id": "389-ds-base-debugsource-0:2.0.14-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.0.14-5.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.0.14-5.el9_0.ppc64le",
"product": {
"name": "389-ds-base-debuginfo-0:2.0.14-5.el9_0.ppc64le",
"product_id": "389-ds-base-debuginfo-0:2.0.14-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.0.14-5.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.ppc64le",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.ppc64le",
"product_id": "389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.0.14-5.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.ppc64le",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.ppc64le",
"product_id": "389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.0.14-5.el9_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.0.14-5.el9_0.x86_64",
"product": {
"name": "389-ds-base-0:2.0.14-5.el9_0.x86_64",
"product_id": "389-ds-base-0:2.0.14-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.0.14-5.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.0.14-5.el9_0.x86_64",
"product": {
"name": "389-ds-base-libs-0:2.0.14-5.el9_0.x86_64",
"product_id": "389-ds-base-libs-0:2.0.14-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.0.14-5.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.0.14-5.el9_0.x86_64",
"product": {
"name": "389-ds-base-debugsource-0:2.0.14-5.el9_0.x86_64",
"product_id": "389-ds-base-debugsource-0:2.0.14-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.0.14-5.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.0.14-5.el9_0.x86_64",
"product": {
"name": "389-ds-base-debuginfo-0:2.0.14-5.el9_0.x86_64",
"product_id": "389-ds-base-debuginfo-0:2.0.14-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.0.14-5.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.x86_64",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.x86_64",
"product_id": "389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.0.14-5.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.x86_64",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.x86_64",
"product_id": "389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.0.14-5.el9_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:2.0.14-5.el9_0.s390x",
"product": {
"name": "389-ds-base-0:2.0.14-5.el9_0.s390x",
"product_id": "389-ds-base-0:2.0.14-5.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@2.0.14-5.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:2.0.14-5.el9_0.s390x",
"product": {
"name": "389-ds-base-libs-0:2.0.14-5.el9_0.s390x",
"product_id": "389-ds-base-libs-0:2.0.14-5.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@2.0.14-5.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:2.0.14-5.el9_0.s390x",
"product": {
"name": "389-ds-base-debugsource-0:2.0.14-5.el9_0.s390x",
"product_id": "389-ds-base-debugsource-0:2.0.14-5.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@2.0.14-5.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:2.0.14-5.el9_0.s390x",
"product": {
"name": "389-ds-base-debuginfo-0:2.0.14-5.el9_0.s390x",
"product_id": "389-ds-base-debuginfo-0:2.0.14-5.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@2.0.14-5.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.s390x",
"product": {
"name": "389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.s390x",
"product_id": "389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@2.0.14-5.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.s390x",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.s390x",
"product_id": "389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@2.0.14-5.el9_0?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-lib389-0:2.0.14-5.el9_0.noarch",
"product": {
"name": "python3-lib389-0:2.0.14-5.el9_0.noarch",
"product_id": "python3-lib389-0:2.0.14-5.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-lib389@2.0.14-5.el9_0?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.0.14-5.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:389-ds-base-0:2.0.14-5.el9_0.aarch64"
},
"product_reference": "389-ds-base-0:2.0.14-5.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.0.14-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:389-ds-base-0:2.0.14-5.el9_0.ppc64le"
},
"product_reference": "389-ds-base-0:2.0.14-5.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.0.14-5.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:389-ds-base-0:2.0.14-5.el9_0.s390x"
},
"product_reference": "389-ds-base-0:2.0.14-5.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.0.14-5.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:389-ds-base-0:2.0.14-5.el9_0.src"
},
"product_reference": "389-ds-base-0:2.0.14-5.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:2.0.14-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:389-ds-base-0:2.0.14-5.el9_0.x86_64"
},
"product_reference": "389-ds-base-0:2.0.14-5.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.0.14-5.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:389-ds-base-debuginfo-0:2.0.14-5.el9_0.aarch64"
},
"product_reference": "389-ds-base-debuginfo-0:2.0.14-5.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.0.14-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:389-ds-base-debuginfo-0:2.0.14-5.el9_0.ppc64le"
},
"product_reference": "389-ds-base-debuginfo-0:2.0.14-5.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.0.14-5.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:389-ds-base-debuginfo-0:2.0.14-5.el9_0.s390x"
},
"product_reference": "389-ds-base-debuginfo-0:2.0.14-5.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:2.0.14-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:389-ds-base-debuginfo-0:2.0.14-5.el9_0.x86_64"
},
"product_reference": "389-ds-base-debuginfo-0:2.0.14-5.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.0.14-5.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:389-ds-base-debugsource-0:2.0.14-5.el9_0.aarch64"
},
"product_reference": "389-ds-base-debugsource-0:2.0.14-5.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.0.14-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:389-ds-base-debugsource-0:2.0.14-5.el9_0.ppc64le"
},
"product_reference": "389-ds-base-debugsource-0:2.0.14-5.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.0.14-5.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:389-ds-base-debugsource-0:2.0.14-5.el9_0.s390x"
},
"product_reference": "389-ds-base-debugsource-0:2.0.14-5.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:2.0.14-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:389-ds-base-debugsource-0:2.0.14-5.el9_0.x86_64"
},
"product_reference": "389-ds-base-debugsource-0:2.0.14-5.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.0.14-5.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:389-ds-base-libs-0:2.0.14-5.el9_0.aarch64"
},
"product_reference": "389-ds-base-libs-0:2.0.14-5.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.0.14-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:389-ds-base-libs-0:2.0.14-5.el9_0.ppc64le"
},
"product_reference": "389-ds-base-libs-0:2.0.14-5.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.0.14-5.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:389-ds-base-libs-0:2.0.14-5.el9_0.s390x"
},
"product_reference": "389-ds-base-libs-0:2.0.14-5.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:2.0.14-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:389-ds-base-libs-0:2.0.14-5.el9_0.x86_64"
},
"product_reference": "389-ds-base-libs-0:2.0.14-5.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.aarch64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.ppc64le"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.s390x"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.x86_64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.aarch64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.ppc64le"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.s390x"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.x86_64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:2.0.14-5.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-lib389-0:2.0.14-5.el9_0.noarch"
},
"product_reference": "python3-lib389-0:2.0.14-5.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-14905",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-12-18T18:04:56.621000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423624"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Directory Server. A heap buffer overflow in the `389-ds-base` component can lead to a denial of service or potential remote code execution. Exploitation requires high privileges on the Directory Server, limiting the attack surface to authenticated administrative users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:389-ds-base-0:2.0.14-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:389-ds-base-0:2.0.14-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:389-ds-base-0:2.0.14-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:389-ds-base-0:2.0.14-5.el9_0.src",
"AppStream-9.0.0.Z.E4S:389-ds-base-0:2.0.14-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:389-ds-base-debuginfo-0:2.0.14-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:389-ds-base-debuginfo-0:2.0.14-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:389-ds-base-debuginfo-0:2.0.14-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:389-ds-base-debuginfo-0:2.0.14-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:389-ds-base-debugsource-0:2.0.14-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:389-ds-base-debugsource-0:2.0.14-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:389-ds-base-debugsource-0:2.0.14-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:389-ds-base-debugsource-0:2.0.14-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-0:2.0.14-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-0:2.0.14-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-0:2.0.14-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-0:2.0.14-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-lib389-0:2.0.14-5.el9_0.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "RHBZ#2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905"
}
],
"release_date": "2026-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T10:03:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:389-ds-base-0:2.0.14-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:389-ds-base-0:2.0.14-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:389-ds-base-0:2.0.14-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:389-ds-base-0:2.0.14-5.el9_0.src",
"AppStream-9.0.0.Z.E4S:389-ds-base-0:2.0.14-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:389-ds-base-debuginfo-0:2.0.14-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:389-ds-base-debuginfo-0:2.0.14-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:389-ds-base-debuginfo-0:2.0.14-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:389-ds-base-debuginfo-0:2.0.14-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:389-ds-base-debugsource-0:2.0.14-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:389-ds-base-debugsource-0:2.0.14-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:389-ds-base-debugsource-0:2.0.14-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:389-ds-base-debugsource-0:2.0.14-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-0:2.0.14-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-0:2.0.14-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-0:2.0.14-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-0:2.0.14-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-lib389-0:2.0.14-5.el9_0.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5597"
},
{
"category": "workaround",
"details": "Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:389-ds-base-0:2.0.14-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:389-ds-base-0:2.0.14-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:389-ds-base-0:2.0.14-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:389-ds-base-0:2.0.14-5.el9_0.src",
"AppStream-9.0.0.Z.E4S:389-ds-base-0:2.0.14-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:389-ds-base-debuginfo-0:2.0.14-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:389-ds-base-debuginfo-0:2.0.14-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:389-ds-base-debuginfo-0:2.0.14-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:389-ds-base-debuginfo-0:2.0.14-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:389-ds-base-debugsource-0:2.0.14-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:389-ds-base-debugsource-0:2.0.14-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:389-ds-base-debugsource-0:2.0.14-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:389-ds-base-debugsource-0:2.0.14-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-0:2.0.14-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-0:2.0.14-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-0:2.0.14-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-0:2.0.14-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-lib389-0:2.0.14-5.el9_0.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:389-ds-base-0:2.0.14-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:389-ds-base-0:2.0.14-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:389-ds-base-0:2.0.14-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:389-ds-base-0:2.0.14-5.el9_0.src",
"AppStream-9.0.0.Z.E4S:389-ds-base-0:2.0.14-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:389-ds-base-debuginfo-0:2.0.14-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:389-ds-base-debuginfo-0:2.0.14-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:389-ds-base-debuginfo-0:2.0.14-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:389-ds-base-debuginfo-0:2.0.14-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:389-ds-base-debugsource-0:2.0.14-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:389-ds-base-debugsource-0:2.0.14-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:389-ds-base-debugsource-0:2.0.14-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:389-ds-base-debugsource-0:2.0.14-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-0:2.0.14-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-0:2.0.14-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-0:2.0.14-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-0:2.0.14-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:389-ds-base-libs-debuginfo-0:2.0.14-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:389-ds-base-snmp-debuginfo-0:2.0.14-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-lib389-0:2.0.14-5.el9_0.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow"
}
]
}
RHSA-2026:5568
Vulnerability from csaf_redhat - Published: 2026-03-24 08:48 - Updated: 2026-03-31 17:31A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the redhat-ds:11 module is now available for Red Hat Directory Server 11.7 E4S for RHEL 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Directory Server is an LDAPv3-compliant directory server. The suite of packages includes the Lightweight Directory Access Protocol (LDAP) server, as well as command-line utilities and Web UI packages for server administration.\n\nSecurity Fix(es):\n\n* 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:5568",
"url": "https://access.redhat.com/errata/RHSA-2026:5568"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_5568.json"
}
],
"title": "Red Hat Security Advisory: redhat-ds:11 security update",
"tracking": {
"current_release_date": "2026-03-31T17:31:22+00:00",
"generator": {
"date": "2026-03-31T17:31:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:5568",
"initial_release_date": "2026-03-24T08:48:12+00:00",
"revision_history": [
{
"date": "2026-03-24T08:48:12+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-24T08:48:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-31T17:31:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Directory Server 11.7 E4S for RHEL 8",
"product": {
"name": "Red Hat Directory Server 11.7 E4S for RHEL 8",
"product_id": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:directory_server_e4s:11.7::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Directory Server"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.4.3.34-14.module+el8dsrv+24041+386df666.src::redhat-ds:11",
"product": {
"name": "389-ds-base-0:1.4.3.34-14.module+el8dsrv+24041+386df666.src (redhat-ds:11)",
"product_id": "389-ds-base-0:1.4.3.34-14.module+el8dsrv+24041+386df666.src::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.4.3.34-14.module%2Bel8dsrv%2B24041%2B386df666?arch=src\u0026rpmmod=redhat-ds:11:8080020260227193008:f969626e"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.4.3.34-14.module%2Bel8dsrv%2B24041%2B386df666?arch=x86_64\u0026rpmmod=redhat-ds:11:8080020260227193008:f969626e"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@1.4.3.34-14.module%2Bel8dsrv%2B24041%2B386df666?arch=x86_64\u0026rpmmod=redhat-ds:11:8080020260227193008:f969626e"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-debugsource-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-debugsource-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@1.4.3.34-14.module%2Bel8dsrv%2B24041%2B386df666?arch=x86_64\u0026rpmmod=redhat-ds:11:8080020260227193008:f969626e"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-devel-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-devel-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@1.4.3.34-14.module%2Bel8dsrv%2B24041%2B386df666?arch=x86_64\u0026rpmmod=redhat-ds:11:8080020260227193008:f969626e"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-legacy-tools-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-legacy-tools-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools@1.4.3.34-14.module%2Bel8dsrv%2B24041%2B386df666?arch=x86_64\u0026rpmmod=redhat-ds:11:8080020260227193008:f969626e"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools-debuginfo@1.4.3.34-14.module%2Bel8dsrv%2B24041%2B386df666?arch=x86_64\u0026rpmmod=redhat-ds:11:8080020260227193008:f969626e"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-libs-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-libs-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@1.4.3.34-14.module%2Bel8dsrv%2B24041%2B386df666?arch=x86_64\u0026rpmmod=redhat-ds:11:8080020260227193008:f969626e"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-libs-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@1.4.3.34-14.module%2Bel8dsrv%2B24041%2B386df666?arch=x86_64\u0026rpmmod=redhat-ds:11:8080020260227193008:f969626e"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-snmp-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-snmp-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@1.4.3.34-14.module%2Bel8dsrv%2B24041%2B386df666?arch=x86_64\u0026rpmmod=redhat-ds:11:8080020260227193008:f969626e"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64 (redhat-ds:11)",
"product_id": "389-ds-base-snmp-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@1.4.3.34-14.module%2Bel8dsrv%2B24041%2B386df666?arch=x86_64\u0026rpmmod=redhat-ds:11:8080020260227193008:f969626e"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "cockpit-389-ds-0:1.4.3.34-14.module+el8dsrv+24041+386df666.noarch::redhat-ds:11",
"product": {
"name": "cockpit-389-ds-0:1.4.3.34-14.module+el8dsrv+24041+386df666.noarch (redhat-ds:11)",
"product_id": "cockpit-389-ds-0:1.4.3.34-14.module+el8dsrv+24041+386df666.noarch::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cockpit-389-ds@1.4.3.34-14.module%2Bel8dsrv%2B24041%2B386df666?arch=noarch\u0026rpmmod=redhat-ds:11:8080020260227193008:f969626e"
}
}
},
{
"category": "product_version",
"name": "python3-lib389-0:1.4.3.34-14.module+el8dsrv+24041+386df666.noarch::redhat-ds:11",
"product": {
"name": "python3-lib389-0:1.4.3.34-14.module+el8dsrv+24041+386df666.noarch (redhat-ds:11)",
"product_id": "python3-lib389-0:1.4.3.34-14.module+el8dsrv+24041+386df666.noarch::redhat-ds:11",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-lib389@1.4.3.34-14.module%2Bel8dsrv%2B24041%2B386df666?arch=noarch\u0026rpmmod=redhat-ds:11:8080020260227193008:f969626e"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.34-14.module+el8dsrv+24041+386df666.src (redhat-ds:11) as a component of Red Hat Directory Server 11.7 E4S for RHEL 8",
"product_id": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-0:1.4.3.34-14.module+el8dsrv+24041+386df666.src::redhat-ds:11"
},
"product_reference": "389-ds-base-0:1.4.3.34-14.module+el8dsrv+24041+386df666.src::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.7 E4S for RHEL 8",
"product_id": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.7 E4S for RHEL 8",
"product_id": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.7 E4S for RHEL 8",
"product_id": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-debugsource-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-debugsource-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.7 E4S for RHEL 8",
"product_id": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-devel-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-devel-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.7 E4S for RHEL 8",
"product_id": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-legacy-tools-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-legacy-tools-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.7 E4S for RHEL 8",
"product_id": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.7 E4S for RHEL 8",
"product_id": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-libs-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-libs-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.7 E4S for RHEL 8",
"product_id": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-libs-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.7 E4S for RHEL 8",
"product_id": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-snmp-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-snmp-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64 (redhat-ds:11) as a component of Red Hat Directory Server 11.7 E4S for RHEL 8",
"product_id": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-389-ds-0:1.4.3.34-14.module+el8dsrv+24041+386df666.noarch (redhat-ds:11) as a component of Red Hat Directory Server 11.7 E4S for RHEL 8",
"product_id": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:cockpit-389-ds-0:1.4.3.34-14.module+el8dsrv+24041+386df666.noarch::redhat-ds:11"
},
"product_reference": "cockpit-389-ds-0:1.4.3.34-14.module+el8dsrv+24041+386df666.noarch::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:1.4.3.34-14.module+el8dsrv+24041+386df666.noarch (redhat-ds:11) as a component of Red Hat Directory Server 11.7 E4S for RHEL 8",
"product_id": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:python3-lib389-0:1.4.3.34-14.module+el8dsrv+24041+386df666.noarch::redhat-ds:11"
},
"product_reference": "python3-lib389-0:1.4.3.34-14.module+el8dsrv+24041+386df666.noarch::redhat-ds:11",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-14905",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-12-18T18:04:56.621000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423624"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Directory Server. A heap buffer overflow in the `389-ds-base` component can lead to a denial of service or potential remote code execution. Exploitation requires high privileges on the Directory Server, limiting the attack surface to authenticated administrative users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-0:1.4.3.34-14.module+el8dsrv+24041+386df666.src::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-debugsource-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-devel-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-legacy-tools-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-libs-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-snmp-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:cockpit-389-ds-0:1.4.3.34-14.module+el8dsrv+24041+386df666.noarch::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:python3-lib389-0:1.4.3.34-14.module+el8dsrv+24041+386df666.noarch::redhat-ds:11"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "RHBZ#2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905"
}
],
"release_date": "2026-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T08:48:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-0:1.4.3.34-14.module+el8dsrv+24041+386df666.src::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-debugsource-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-devel-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-legacy-tools-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-libs-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-snmp-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:cockpit-389-ds-0:1.4.3.34-14.module+el8dsrv+24041+386df666.noarch::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:python3-lib389-0:1.4.3.34-14.module+el8dsrv+24041+386df666.noarch::redhat-ds:11"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5568"
},
{
"category": "workaround",
"details": "Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.",
"product_ids": [
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-0:1.4.3.34-14.module+el8dsrv+24041+386df666.src::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-debugsource-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-devel-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-legacy-tools-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-libs-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-snmp-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:cockpit-389-ds-0:1.4.3.34-14.module+el8dsrv+24041+386df666.noarch::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:python3-lib389-0:1.4.3.34-14.module+el8dsrv+24041+386df666.noarch::redhat-ds:11"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-0:1.4.3.34-14.module+el8dsrv+24041+386df666.src::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-debugsource-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-devel-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-legacy-tools-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-libs-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-snmp-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-14.module+el8dsrv+24041+386df666.x86_64::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:cockpit-389-ds-0:1.4.3.34-14.module+el8dsrv+24041+386df666.noarch::redhat-ds:11",
"BaseOS-8.8.0.Z.E4S-DirSrv-11.7-E4S:python3-lib389-0:1.4.3.34-14.module+el8dsrv+24041+386df666.noarch::redhat-ds:11"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow"
}
]
}
RHSA-2026:3504
Vulnerability from csaf_redhat - Published: 2026-03-02 06:33 - Updated: 2026-03-31 17:18A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for 389-ds-base is now available for Red Hat Enterprise Linux 10.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.\n\nSecurity Fix(es):\n\n* 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3504",
"url": "https://access.redhat.com/errata/RHSA-2026:3504"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "external",
"summary": "RHEL-140090",
"url": "https://issues.redhat.com/browse/RHEL-140090"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3504.json"
}
],
"title": "Red Hat Security Advisory: 389-ds-base security update",
"tracking": {
"current_release_date": "2026-03-31T17:18:00+00:00",
"generator": {
"date": "2026-03-31T17:18:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:3504",
"initial_release_date": "2026-03-02T06:33:01+00:00",
"revision_history": [
{
"date": "2026-03-02T06:33:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-02T06:33:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-31T17:18:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux_eus:10.0"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux_eus:10.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:3.0.6-17.el10_0.src",
"product": {
"name": "389-ds-base-0:3.0.6-17.el10_0.src",
"product_id": "389-ds-base-0:3.0.6-17.el10_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@3.0.6-17.el10_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:3.0.6-17.el10_0.aarch64",
"product": {
"name": "389-ds-base-0:3.0.6-17.el10_0.aarch64",
"product_id": "389-ds-base-0:3.0.6-17.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@3.0.6-17.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:3.0.6-17.el10_0.aarch64",
"product": {
"name": "389-ds-base-libs-0:3.0.6-17.el10_0.aarch64",
"product_id": "389-ds-base-libs-0:3.0.6-17.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@3.0.6-17.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:3.0.6-17.el10_0.aarch64",
"product": {
"name": "389-ds-base-snmp-0:3.0.6-17.el10_0.aarch64",
"product_id": "389-ds-base-snmp-0:3.0.6-17.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@3.0.6-17.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:3.0.6-17.el10_0.aarch64",
"product": {
"name": "389-ds-base-debugsource-0:3.0.6-17.el10_0.aarch64",
"product_id": "389-ds-base-debugsource-0:3.0.6-17.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@3.0.6-17.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.aarch64",
"product": {
"name": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.aarch64",
"product_id": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-bdb-debuginfo@3.0.6-17.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.aarch64",
"product": {
"name": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.aarch64",
"product_id": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@3.0.6-17.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.aarch64",
"product": {
"name": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.aarch64",
"product_id": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@3.0.6-17.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.aarch64",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.aarch64",
"product_id": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@3.0.6-17.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-bdb-0:3.0.6-17.el10_0.aarch64",
"product": {
"name": "389-ds-base-bdb-0:3.0.6-17.el10_0.aarch64",
"product_id": "389-ds-base-bdb-0:3.0.6-17.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-bdb@3.0.6-17.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:3.0.6-17.el10_0.aarch64",
"product": {
"name": "389-ds-base-devel-0:3.0.6-17.el10_0.aarch64",
"product_id": "389-ds-base-devel-0:3.0.6-17.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@3.0.6-17.el10_0?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:3.0.6-17.el10_0.ppc64le",
"product": {
"name": "389-ds-base-0:3.0.6-17.el10_0.ppc64le",
"product_id": "389-ds-base-0:3.0.6-17.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@3.0.6-17.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:3.0.6-17.el10_0.ppc64le",
"product": {
"name": "389-ds-base-libs-0:3.0.6-17.el10_0.ppc64le",
"product_id": "389-ds-base-libs-0:3.0.6-17.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@3.0.6-17.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:3.0.6-17.el10_0.ppc64le",
"product": {
"name": "389-ds-base-snmp-0:3.0.6-17.el10_0.ppc64le",
"product_id": "389-ds-base-snmp-0:3.0.6-17.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@3.0.6-17.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:3.0.6-17.el10_0.ppc64le",
"product": {
"name": "389-ds-base-debugsource-0:3.0.6-17.el10_0.ppc64le",
"product_id": "389-ds-base-debugsource-0:3.0.6-17.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@3.0.6-17.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"product": {
"name": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"product_id": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-bdb-debuginfo@3.0.6-17.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"product": {
"name": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"product_id": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@3.0.6-17.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"product": {
"name": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"product_id": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@3.0.6-17.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"product_id": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@3.0.6-17.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-bdb-0:3.0.6-17.el10_0.ppc64le",
"product": {
"name": "389-ds-base-bdb-0:3.0.6-17.el10_0.ppc64le",
"product_id": "389-ds-base-bdb-0:3.0.6-17.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-bdb@3.0.6-17.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:3.0.6-17.el10_0.ppc64le",
"product": {
"name": "389-ds-base-devel-0:3.0.6-17.el10_0.ppc64le",
"product_id": "389-ds-base-devel-0:3.0.6-17.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@3.0.6-17.el10_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:3.0.6-17.el10_0.x86_64",
"product": {
"name": "389-ds-base-0:3.0.6-17.el10_0.x86_64",
"product_id": "389-ds-base-0:3.0.6-17.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@3.0.6-17.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:3.0.6-17.el10_0.x86_64",
"product": {
"name": "389-ds-base-libs-0:3.0.6-17.el10_0.x86_64",
"product_id": "389-ds-base-libs-0:3.0.6-17.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@3.0.6-17.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:3.0.6-17.el10_0.x86_64",
"product": {
"name": "389-ds-base-snmp-0:3.0.6-17.el10_0.x86_64",
"product_id": "389-ds-base-snmp-0:3.0.6-17.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@3.0.6-17.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:3.0.6-17.el10_0.x86_64",
"product": {
"name": "389-ds-base-debugsource-0:3.0.6-17.el10_0.x86_64",
"product_id": "389-ds-base-debugsource-0:3.0.6-17.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@3.0.6-17.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.x86_64",
"product": {
"name": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.x86_64",
"product_id": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-bdb-debuginfo@3.0.6-17.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.x86_64",
"product": {
"name": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.x86_64",
"product_id": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@3.0.6-17.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.x86_64",
"product": {
"name": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.x86_64",
"product_id": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@3.0.6-17.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.x86_64",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.x86_64",
"product_id": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@3.0.6-17.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-bdb-0:3.0.6-17.el10_0.x86_64",
"product": {
"name": "389-ds-base-bdb-0:3.0.6-17.el10_0.x86_64",
"product_id": "389-ds-base-bdb-0:3.0.6-17.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-bdb@3.0.6-17.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:3.0.6-17.el10_0.x86_64",
"product": {
"name": "389-ds-base-devel-0:3.0.6-17.el10_0.x86_64",
"product_id": "389-ds-base-devel-0:3.0.6-17.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@3.0.6-17.el10_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:3.0.6-17.el10_0.s390x",
"product": {
"name": "389-ds-base-0:3.0.6-17.el10_0.s390x",
"product_id": "389-ds-base-0:3.0.6-17.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@3.0.6-17.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:3.0.6-17.el10_0.s390x",
"product": {
"name": "389-ds-base-libs-0:3.0.6-17.el10_0.s390x",
"product_id": "389-ds-base-libs-0:3.0.6-17.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@3.0.6-17.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:3.0.6-17.el10_0.s390x",
"product": {
"name": "389-ds-base-snmp-0:3.0.6-17.el10_0.s390x",
"product_id": "389-ds-base-snmp-0:3.0.6-17.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@3.0.6-17.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:3.0.6-17.el10_0.s390x",
"product": {
"name": "389-ds-base-debugsource-0:3.0.6-17.el10_0.s390x",
"product_id": "389-ds-base-debugsource-0:3.0.6-17.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@3.0.6-17.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.s390x",
"product": {
"name": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.s390x",
"product_id": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-bdb-debuginfo@3.0.6-17.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.s390x",
"product": {
"name": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.s390x",
"product_id": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@3.0.6-17.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.s390x",
"product": {
"name": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.s390x",
"product_id": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@3.0.6-17.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.s390x",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.s390x",
"product_id": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@3.0.6-17.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-bdb-0:3.0.6-17.el10_0.s390x",
"product": {
"name": "389-ds-base-bdb-0:3.0.6-17.el10_0.s390x",
"product_id": "389-ds-base-bdb-0:3.0.6-17.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-bdb@3.0.6-17.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:3.0.6-17.el10_0.s390x",
"product": {
"name": "389-ds-base-devel-0:3.0.6-17.el10_0.s390x",
"product_id": "389-ds-base-devel-0:3.0.6-17.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@3.0.6-17.el10_0?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-lib389-0:3.0.6-17.el10_0.noarch",
"product": {
"name": "python3-lib389-0:3.0.6-17.el10_0.noarch",
"product_id": "python3-lib389-0:3.0.6-17.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-lib389@3.0.6-17.el10_0?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.0.6-17.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.aarch64"
},
"product_reference": "389-ds-base-0:3.0.6-17.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.0.6-17.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.ppc64le"
},
"product_reference": "389-ds-base-0:3.0.6-17.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.0.6-17.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.s390x"
},
"product_reference": "389-ds-base-0:3.0.6-17.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.0.6-17.el10_0.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.src"
},
"product_reference": "389-ds-base-0:3.0.6-17.el10_0.src",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.0.6-17.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.x86_64"
},
"product_reference": "389-ds-base-0:3.0.6-17.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-0:3.0.6-17.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.aarch64"
},
"product_reference": "389-ds-base-bdb-0:3.0.6-17.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-0:3.0.6-17.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.ppc64le"
},
"product_reference": "389-ds-base-bdb-0:3.0.6-17.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-0:3.0.6-17.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.s390x"
},
"product_reference": "389-ds-base-bdb-0:3.0.6-17.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-0:3.0.6-17.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.x86_64"
},
"product_reference": "389-ds-base-bdb-0:3.0.6-17.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.aarch64"
},
"product_reference": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.ppc64le"
},
"product_reference": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.s390x"
},
"product_reference": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.x86_64"
},
"product_reference": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.aarch64"
},
"product_reference": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.ppc64le"
},
"product_reference": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.s390x"
},
"product_reference": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.x86_64"
},
"product_reference": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:3.0.6-17.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.aarch64"
},
"product_reference": "389-ds-base-debugsource-0:3.0.6-17.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:3.0.6-17.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.ppc64le"
},
"product_reference": "389-ds-base-debugsource-0:3.0.6-17.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:3.0.6-17.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.s390x"
},
"product_reference": "389-ds-base-debugsource-0:3.0.6-17.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:3.0.6-17.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.x86_64"
},
"product_reference": "389-ds-base-debugsource-0:3.0.6-17.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:3.0.6-17.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.aarch64"
},
"product_reference": "389-ds-base-devel-0:3.0.6-17.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:3.0.6-17.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.ppc64le"
},
"product_reference": "389-ds-base-devel-0:3.0.6-17.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:3.0.6-17.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.s390x"
},
"product_reference": "389-ds-base-devel-0:3.0.6-17.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:3.0.6-17.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.x86_64"
},
"product_reference": "389-ds-base-devel-0:3.0.6-17.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:3.0.6-17.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.aarch64"
},
"product_reference": "389-ds-base-libs-0:3.0.6-17.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:3.0.6-17.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.ppc64le"
},
"product_reference": "389-ds-base-libs-0:3.0.6-17.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:3.0.6-17.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.s390x"
},
"product_reference": "389-ds-base-libs-0:3.0.6-17.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:3.0.6-17.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.x86_64"
},
"product_reference": "389-ds-base-libs-0:3.0.6-17.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.aarch64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.ppc64le"
},
"product_reference": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.s390x"
},
"product_reference": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.x86_64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:3.0.6-17.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.aarch64"
},
"product_reference": "389-ds-base-snmp-0:3.0.6-17.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:3.0.6-17.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.ppc64le"
},
"product_reference": "389-ds-base-snmp-0:3.0.6-17.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:3.0.6-17.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.s390x"
},
"product_reference": "389-ds-base-snmp-0:3.0.6-17.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:3.0.6-17.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.x86_64"
},
"product_reference": "389-ds-base-snmp-0:3.0.6-17.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.aarch64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.ppc64le"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.s390x"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.x86_64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:3.0.6-17.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:python3-lib389-0:3.0.6-17.el10_0.noarch"
},
"product_reference": "python3-lib389-0:3.0.6-17.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.0.6-17.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.aarch64"
},
"product_reference": "389-ds-base-0:3.0.6-17.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.0.6-17.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.ppc64le"
},
"product_reference": "389-ds-base-0:3.0.6-17.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.0.6-17.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.s390x"
},
"product_reference": "389-ds-base-0:3.0.6-17.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.0.6-17.el10_0.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.src"
},
"product_reference": "389-ds-base-0:3.0.6-17.el10_0.src",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:3.0.6-17.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.x86_64"
},
"product_reference": "389-ds-base-0:3.0.6-17.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-0:3.0.6-17.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.aarch64"
},
"product_reference": "389-ds-base-bdb-0:3.0.6-17.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-0:3.0.6-17.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.ppc64le"
},
"product_reference": "389-ds-base-bdb-0:3.0.6-17.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-0:3.0.6-17.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.s390x"
},
"product_reference": "389-ds-base-bdb-0:3.0.6-17.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-0:3.0.6-17.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.x86_64"
},
"product_reference": "389-ds-base-bdb-0:3.0.6-17.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.aarch64"
},
"product_reference": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.ppc64le"
},
"product_reference": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.s390x"
},
"product_reference": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.x86_64"
},
"product_reference": "389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.aarch64"
},
"product_reference": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.ppc64le"
},
"product_reference": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.s390x"
},
"product_reference": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.x86_64"
},
"product_reference": "389-ds-base-debuginfo-0:3.0.6-17.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:3.0.6-17.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.aarch64"
},
"product_reference": "389-ds-base-debugsource-0:3.0.6-17.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:3.0.6-17.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.ppc64le"
},
"product_reference": "389-ds-base-debugsource-0:3.0.6-17.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:3.0.6-17.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.s390x"
},
"product_reference": "389-ds-base-debugsource-0:3.0.6-17.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:3.0.6-17.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.x86_64"
},
"product_reference": "389-ds-base-debugsource-0:3.0.6-17.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:3.0.6-17.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.aarch64"
},
"product_reference": "389-ds-base-devel-0:3.0.6-17.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:3.0.6-17.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.ppc64le"
},
"product_reference": "389-ds-base-devel-0:3.0.6-17.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:3.0.6-17.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.s390x"
},
"product_reference": "389-ds-base-devel-0:3.0.6-17.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:3.0.6-17.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.x86_64"
},
"product_reference": "389-ds-base-devel-0:3.0.6-17.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:3.0.6-17.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.aarch64"
},
"product_reference": "389-ds-base-libs-0:3.0.6-17.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:3.0.6-17.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.ppc64le"
},
"product_reference": "389-ds-base-libs-0:3.0.6-17.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:3.0.6-17.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.s390x"
},
"product_reference": "389-ds-base-libs-0:3.0.6-17.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:3.0.6-17.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.x86_64"
},
"product_reference": "389-ds-base-libs-0:3.0.6-17.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.aarch64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.ppc64le"
},
"product_reference": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.s390x"
},
"product_reference": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.x86_64"
},
"product_reference": "389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:3.0.6-17.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.aarch64"
},
"product_reference": "389-ds-base-snmp-0:3.0.6-17.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:3.0.6-17.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.ppc64le"
},
"product_reference": "389-ds-base-snmp-0:3.0.6-17.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:3.0.6-17.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.s390x"
},
"product_reference": "389-ds-base-snmp-0:3.0.6-17.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:3.0.6-17.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.x86_64"
},
"product_reference": "389-ds-base-snmp-0:3.0.6-17.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.aarch64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.ppc64le"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.s390x"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.x86_64"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:3.0.6-17.el10_0.noarch as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:python3-lib389-0:3.0.6-17.el10_0.noarch"
},
"product_reference": "python3-lib389-0:3.0.6-17.el10_0.noarch",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-14905",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-12-18T18:04:56.621000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423624"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Directory Server. A heap buffer overflow in the `389-ds-base` component can lead to a denial of service or potential remote code execution. Exploitation requires high privileges on the Directory Server, limiting the attack surface to authenticated administrative users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.src",
"AppStream-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:python3-lib389-0:3.0.6-17.el10_0.noarch",
"CRB-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.src",
"CRB-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:python3-lib389-0:3.0.6-17.el10_0.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "RHBZ#2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905"
}
],
"release_date": "2026-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-02T06:33:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.src",
"AppStream-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:python3-lib389-0:3.0.6-17.el10_0.noarch",
"CRB-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.src",
"CRB-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:python3-lib389-0:3.0.6-17.el10_0.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3504"
},
{
"category": "workaround",
"details": "Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.",
"product_ids": [
"AppStream-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.src",
"AppStream-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:python3-lib389-0:3.0.6-17.el10_0.noarch",
"CRB-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.src",
"CRB-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:python3-lib389-0:3.0.6-17.el10_0.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.src",
"AppStream-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.aarch64",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.s390x",
"AppStream-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.x86_64",
"AppStream-10.0.Z.E2S:python3-lib389-0:3.0.6-17.el10_0.noarch",
"CRB-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.src",
"CRB-10.0.Z.E2S:389-ds-base-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-bdb-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-bdb-debuginfo-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-debuginfo-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-debugsource-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-devel-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-libs-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-libs-debuginfo-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-snmp-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.aarch64",
"CRB-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.ppc64le",
"CRB-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.s390x",
"CRB-10.0.Z.E2S:389-ds-base-snmp-debuginfo-0:3.0.6-17.el10_0.x86_64",
"CRB-10.0.Z.E2S:python3-lib389-0:3.0.6-17.el10_0.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow"
}
]
}
RHSA-2026:5511
Vulnerability from csaf_redhat - Published: 2026-03-24 00:37 - Updated: 2026-03-31 17:31A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the 389-ds:1.4 module is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. \n\nSecurity Fix(es):\n\n* 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:5511",
"url": "https://access.redhat.com/errata/RHSA-2026:5511"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_5511.json"
}
],
"title": "Red Hat Security Advisory: 389-ds:1.4 security update",
"tracking": {
"current_release_date": "2026-03-31T17:31:23+00:00",
"generator": {
"date": "2026-03-31T17:31:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:5511",
"initial_release_date": "2026-03-24T00:37:55+00:00",
"revision_history": [
{
"date": "2026-03-24T00:37:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-24T00:37:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-31T17:31:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.src::389-ds:1.4",
"product": {
"name": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.src (389-ds:1.4)",
"product_id": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.src::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=src\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=x86_64\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=x86_64\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=x86_64\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=x86_64\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=x86_64\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools-debuginfo@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=x86_64\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=x86_64\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=x86_64\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=x86_64\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=x86_64\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-lib389-0:1.4.3.34-8.module+el8.6.0+24051+60483925.noarch::389-ds:1.4",
"product": {
"name": "python3-lib389-0:1.4.3.34-8.module+el8.6.0+24051+60483925.noarch (389-ds:1.4)",
"product_id": "python3-lib389-0:1.4.3.34-8.module+el8.6.0+24051+60483925.noarch::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-lib389@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=noarch\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"product": {
"name": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64 (389-ds:1.4)",
"product_id": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=aarch64\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"product": {
"name": "389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64 (389-ds:1.4)",
"product_id": "389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=aarch64\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"product": {
"name": "389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64 (389-ds:1.4)",
"product_id": "389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=aarch64\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"product": {
"name": "389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64 (389-ds:1.4)",
"product_id": "389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=aarch64\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"product": {
"name": "389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64 (389-ds:1.4)",
"product_id": "389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=aarch64\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"product": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64 (389-ds:1.4)",
"product_id": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools-debuginfo@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=aarch64\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"product": {
"name": "389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64 (389-ds:1.4)",
"product_id": "389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=aarch64\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"product": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64 (389-ds:1.4)",
"product_id": "389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=aarch64\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"product": {
"name": "389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64 (389-ds:1.4)",
"product_id": "389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=aarch64\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64 (389-ds:1.4)",
"product_id": "389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=aarch64\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=ppc64le\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=ppc64le\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=ppc64le\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=ppc64le\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=ppc64le\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools-debuginfo@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=ppc64le\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=ppc64le\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=ppc64le\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=ppc64le\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=ppc64le\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"product": {
"name": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x (389-ds:1.4)",
"product_id": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=s390x\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"product": {
"name": "389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x (389-ds:1.4)",
"product_id": "389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=s390x\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"product": {
"name": "389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x (389-ds:1.4)",
"product_id": "389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=s390x\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"product": {
"name": "389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x (389-ds:1.4)",
"product_id": "389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=s390x\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"product": {
"name": "389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x (389-ds:1.4)",
"product_id": "389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=s390x\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"product": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x (389-ds:1.4)",
"product_id": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools-debuginfo@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=s390x\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"product": {
"name": "389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x (389-ds:1.4)",
"product_id": "389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=s390x\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"product": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x (389-ds:1.4)",
"product_id": "389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=s390x\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"product": {
"name": "389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x (389-ds:1.4)",
"product_id": "389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=s390x\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x (389-ds:1.4)",
"product_id": "389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@1.4.3.34-8.module%2Bel8.6.0%2B24051%2B60483925?arch=s390x\u0026rpmmod=389-ds:1.4:8060020260303144613:824efc52"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.src (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.src::389-ds:1.4"
},
"product_reference": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.src::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:1.4.3.34-8.module+el8.6.0+24051+60483925.noarch (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python3-lib389-0:1.4.3.34-8.module+el8.6.0+24051+60483925.noarch::389-ds:1.4"
},
"product_reference": "python3-lib389-0:1.4.3.34-8.module+el8.6.0+24051+60483925.noarch::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4"
},
"product_reference": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4"
},
"product_reference": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.src (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.src::389-ds:1.4"
},
"product_reference": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.src::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4"
},
"product_reference": "389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4"
},
"product_reference": "389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4"
},
"product_reference": "389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4"
},
"product_reference": "389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4"
},
"product_reference": "389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4"
},
"product_reference": "389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:1.4.3.34-8.module+el8.6.0+24051+60483925.noarch (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-lib389-0:1.4.3.34-8.module+el8.6.0+24051+60483925.noarch::389-ds:1.4"
},
"product_reference": "python3-lib389-0:1.4.3.34-8.module+el8.6.0+24051+60483925.noarch::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.src (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.src::389-ds:1.4"
},
"product_reference": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.src::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:1.4.3.34-8.module+el8.6.0+24051+60483925.noarch (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python3-lib389-0:1.4.3.34-8.module+el8.6.0+24051+60483925.noarch::389-ds:1.4"
},
"product_reference": "python3-lib389-0:1.4.3.34-8.module+el8.6.0+24051+60483925.noarch::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-14905",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-12-18T18:04:56.621000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423624"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Directory Server. A heap buffer overflow in the `389-ds-base` component can lead to a denial of service or potential remote code execution. Exploitation requires high privileges on the Directory Server, limiting the attack surface to authenticated administrative users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.src::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:python3-lib389-0:1.4.3.34-8.module+el8.6.0+24051+60483925.noarch::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.src::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:python3-lib389-0:1.4.3.34-8.module+el8.6.0+24051+60483925.noarch::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.src::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:python3-lib389-0:1.4.3.34-8.module+el8.6.0+24051+60483925.noarch::389-ds:1.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "RHBZ#2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905"
}
],
"release_date": "2026-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T00:37:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.src::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:python3-lib389-0:1.4.3.34-8.module+el8.6.0+24051+60483925.noarch::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.src::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:python3-lib389-0:1.4.3.34-8.module+el8.6.0+24051+60483925.noarch::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.src::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:python3-lib389-0:1.4.3.34-8.module+el8.6.0+24051+60483925.noarch::389-ds:1.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5511"
},
{
"category": "workaround",
"details": "Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.src::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:python3-lib389-0:1.4.3.34-8.module+el8.6.0+24051+60483925.noarch::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.src::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:python3-lib389-0:1.4.3.34-8.module+el8.6.0+24051+60483925.noarch::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.src::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:python3-lib389-0:1.4.3.34-8.module+el8.6.0+24051+60483925.noarch::389-ds:1.4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.src::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.AUS:python3-lib389-0:1.4.3.34-8.module+el8.6.0+24051+60483925.noarch::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.src::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.aarch64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.ppc64le::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.s390x::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.E4S:python3-lib389-0:1.4.3.34-8.module+el8.6.0+24051+60483925.noarch::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.src::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-debugsource-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-devel-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-legacy-tools-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-libs-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-libs-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-snmp-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:389-ds-base-snmp-debuginfo-0:1.4.3.34-8.module+el8.6.0+24051+60483925.x86_64::389-ds:1.4",
"AppStream-8.6.0.Z.TUS:python3-lib389-0:1.4.3.34-8.module+el8.6.0+24051+60483925.noarch::389-ds:1.4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow"
}
]
}
RHSA-2026:5576
Vulnerability from csaf_redhat - Published: 2026-03-24 09:51 - Updated: 2026-03-31 17:31A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the 389-ds:1.4 module is now available for Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions and Red Hat Enterprise Linux 8.8 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. \n\nSecurity Fix(es):\n\n* 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:5576",
"url": "https://access.redhat.com/errata/RHSA-2026:5576"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_5576.json"
}
],
"title": "Red Hat Security Advisory: 389-ds:1.4 security update",
"tracking": {
"current_release_date": "2026-03-31T17:31:21+00:00",
"generator": {
"date": "2026-03-31T17:31:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:5576",
"initial_release_date": "2026-03-24T09:51:12+00:00",
"revision_history": [
{
"date": "2026-03-24T09:51:12+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-24T09:51:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-31T17:31:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.src::389-ds:1.4",
"product": {
"name": "389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.src (389-ds:1.4)",
"product_id": "389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.src::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.4.3.35-17.module%2Bel8.8.0%2B24040%2B93041464?arch=src\u0026rpmmod=389-ds:1.4:8080020260227183930:6dbb3803"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-lib389-0:1.4.3.35-17.module+el8.8.0+24040+93041464.noarch::389-ds:1.4",
"product": {
"name": "python3-lib389-0:1.4.3.35-17.module+el8.8.0+24040+93041464.noarch (389-ds:1.4)",
"product_id": "python3-lib389-0:1.4.3.35-17.module+el8.8.0+24040+93041464.noarch::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-lib389@1.4.3.35-17.module%2Bel8.8.0%2B24040%2B93041464?arch=noarch\u0026rpmmod=389-ds:1.4:8080020260227183930:6dbb3803"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.4.3.35-17.module%2Bel8.8.0%2B24040%2B93041464?arch=ppc64le\u0026rpmmod=389-ds:1.4:8080020260227183930:6dbb3803"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@1.4.3.35-17.module%2Bel8.8.0%2B24040%2B93041464?arch=ppc64le\u0026rpmmod=389-ds:1.4:8080020260227183930:6dbb3803"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@1.4.3.35-17.module%2Bel8.8.0%2B24040%2B93041464?arch=ppc64le\u0026rpmmod=389-ds:1.4:8080020260227183930:6dbb3803"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@1.4.3.35-17.module%2Bel8.8.0%2B24040%2B93041464?arch=ppc64le\u0026rpmmod=389-ds:1.4:8080020260227183930:6dbb3803"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools@1.4.3.35-17.module%2Bel8.8.0%2B24040%2B93041464?arch=ppc64le\u0026rpmmod=389-ds:1.4:8080020260227183930:6dbb3803"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools-debuginfo@1.4.3.35-17.module%2Bel8.8.0%2B24040%2B93041464?arch=ppc64le\u0026rpmmod=389-ds:1.4:8080020260227183930:6dbb3803"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@1.4.3.35-17.module%2Bel8.8.0%2B24040%2B93041464?arch=ppc64le\u0026rpmmod=389-ds:1.4:8080020260227183930:6dbb3803"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@1.4.3.35-17.module%2Bel8.8.0%2B24040%2B93041464?arch=ppc64le\u0026rpmmod=389-ds:1.4:8080020260227183930:6dbb3803"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@1.4.3.35-17.module%2Bel8.8.0%2B24040%2B93041464?arch=ppc64le\u0026rpmmod=389-ds:1.4:8080020260227183930:6dbb3803"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le (389-ds:1.4)",
"product_id": "389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@1.4.3.35-17.module%2Bel8.8.0%2B24040%2B93041464?arch=ppc64le\u0026rpmmod=389-ds:1.4:8080020260227183930:6dbb3803"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base@1.4.3.35-17.module%2Bel8.8.0%2B24040%2B93041464?arch=x86_64\u0026rpmmod=389-ds:1.4:8080020260227183930:6dbb3803"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debuginfo@1.4.3.35-17.module%2Bel8.8.0%2B24040%2B93041464?arch=x86_64\u0026rpmmod=389-ds:1.4:8080020260227183930:6dbb3803"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-debugsource@1.4.3.35-17.module%2Bel8.8.0%2B24040%2B93041464?arch=x86_64\u0026rpmmod=389-ds:1.4:8080020260227183930:6dbb3803"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-devel@1.4.3.35-17.module%2Bel8.8.0%2B24040%2B93041464?arch=x86_64\u0026rpmmod=389-ds:1.4:8080020260227183930:6dbb3803"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools@1.4.3.35-17.module%2Bel8.8.0%2B24040%2B93041464?arch=x86_64\u0026rpmmod=389-ds:1.4:8080020260227183930:6dbb3803"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-legacy-tools-debuginfo@1.4.3.35-17.module%2Bel8.8.0%2B24040%2B93041464?arch=x86_64\u0026rpmmod=389-ds:1.4:8080020260227183930:6dbb3803"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs@1.4.3.35-17.module%2Bel8.8.0%2B24040%2B93041464?arch=x86_64\u0026rpmmod=389-ds:1.4:8080020260227183930:6dbb3803"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-libs-debuginfo@1.4.3.35-17.module%2Bel8.8.0%2B24040%2B93041464?arch=x86_64\u0026rpmmod=389-ds:1.4:8080020260227183930:6dbb3803"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp@1.4.3.35-17.module%2Bel8.8.0%2B24040%2B93041464?arch=x86_64\u0026rpmmod=389-ds:1.4:8080020260227183930:6dbb3803"
}
}
},
{
"category": "product_version",
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"product": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4)",
"product_id": "389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/389-ds-base-snmp-debuginfo@1.4.3.35-17.module%2Bel8.8.0%2B24040%2B93041464?arch=x86_64\u0026rpmmod=389-ds:1.4:8080020260227183930:6dbb3803"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.src (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.src::389-ds:1.4"
},
"product_reference": "389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.src::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:1.4.3.35-17.module+el8.8.0+24040+93041464.noarch (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python3-lib389-0:1.4.3.35-17.module+el8.8.0+24040+93041464.noarch::389-ds:1.4"
},
"product_reference": "python3-lib389-0:1.4.3.35-17.module+el8.8.0+24040+93041464.noarch::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.src (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.src::389-ds:1.4"
},
"product_reference": "389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.src::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64 (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4"
},
"product_reference": "389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lib389-0:1.4.3.35-17.module+el8.8.0+24040+93041464.noarch (389-ds:1.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:python3-lib389-0:1.4.3.35-17.module+el8.8.0+24040+93041464.noarch::389-ds:1.4"
},
"product_reference": "python3-lib389-0:1.4.3.35-17.module+el8.8.0+24040+93041464.noarch::389-ds:1.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-14905",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-12-18T18:04:56.621000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423624"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Directory Server. A heap buffer overflow in the `389-ds-base` component can lead to a denial of service or potential remote code execution. Exploitation requires high privileges on the Directory Server, limiting the attack surface to authenticated administrative users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.E4S:389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.src::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:python3-lib389-0:1.4.3.35-17.module+el8.8.0+24040+93041464.noarch::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.src::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:python3-lib389-0:1.4.3.35-17.module+el8.8.0+24040+93041464.noarch::389-ds:1.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "RHBZ#2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905"
}
],
"release_date": "2026-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T09:51:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.E4S:389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.src::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:python3-lib389-0:1.4.3.35-17.module+el8.8.0+24040+93041464.noarch::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.src::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:python3-lib389-0:1.4.3.35-17.module+el8.8.0+24040+93041464.noarch::389-ds:1.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5576"
},
{
"category": "workaround",
"details": "Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.",
"product_ids": [
"AppStream-8.8.0.Z.E4S:389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.src::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:python3-lib389-0:1.4.3.35-17.module+el8.8.0+24040+93041464.noarch::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.src::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:python3-lib389-0:1.4.3.35-17.module+el8.8.0+24040+93041464.noarch::389-ds:1.4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.E4S:389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.src::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.ppc64le::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.E4S:python3-lib389-0:1.4.3.35-17.module+el8.8.0+24040+93041464.noarch::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.src::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-debugsource-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-devel-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-legacy-tools-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-legacy-tools-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-libs-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-libs-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-snmp-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:389-ds-base-snmp-debuginfo-0:1.4.3.35-17.module+el8.8.0+24040+93041464.x86_64::389-ds:1.4",
"AppStream-8.8.0.Z.TUS:python3-lib389-0:1.4.3.35-17.module+el8.8.0+24040+93041464.noarch::389-ds:1.4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow"
}
]
}
RHSA-2026:3379
Vulnerability from csaf_redhat - Published: 2026-02-25 20:03 - Updated: 2026-03-31 15:40A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
| URL | Category | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Directory Server 13.1 container images for RHEL 10 are now available as a Technology Preview in the Red Hat container registry.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Directory Server is an LDAPv3-compliant directory server. The image is maintained by Red Hat and updated regularly.\nTo pull this container image, run the following command: podman pull registry.redhat.io/dirsrv/dirsrv-container-rhel10:13.1",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3379",
"url": "https://access.redhat.com/errata/RHSA-2026:3379"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-14905",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/support/offerings/techpreview",
"url": "https://access.redhat.com/support/offerings/techpreview"
},
{
"category": "external",
"summary": "https://catalog.redhat.com/software/containers/search",
"url": "https://catalog.redhat.com/software/containers/search"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_directory_server/13/html/red_hat_directory_server_13_release_notes/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_directory_server/13/html/red_hat_directory_server_13_release_notes/index"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3379.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Directory Server 13.1 container image available as a Technology Preview",
"tracking": {
"current_release_date": "2026-03-31T15:40:01+00:00",
"generator": {
"date": "2026-03-31T15:40:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:3379",
"initial_release_date": "2026-02-25T20:03:51+00:00",
"revision_history": [
{
"date": "2026-02-25T20:03:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-25T20:04:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-31T15:40:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Directory Server 13.1",
"product": {
"name": "Red Hat Directory Server 13.1",
"product_id": "Red Hat Directory Server 13.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:directory_server:13.1::el10"
}
}
}
],
"category": "product_family",
"name": "Red Hat Directory Server"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/dirsrv/dirsrv-container-rhel10@sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5_amd64",
"product": {
"name": "registry.redhat.io/dirsrv/dirsrv-container-rhel10@sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5_amd64",
"product_id": "registry.redhat.io/dirsrv/dirsrv-container-rhel10@sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/dirsrv-container-rhel10@sha256%3A5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5?arch=amd64\u0026repository_url=registry.redhat.io/dirsrv\u0026tag=1772040913"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/dirsrv/dirsrv-container-rhel10@sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5_amd64 as a component of Red Hat Directory Server 13.1",
"product_id": "Red Hat Directory Server 13.1:registry.redhat.io/dirsrv/dirsrv-container-rhel10@sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5_amd64"
},
"product_reference": "registry.redhat.io/dirsrv/dirsrv-container-rhel10@sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5_amd64",
"relates_to_product_reference": "Red Hat Directory Server 13.1"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-14905",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-12-18T18:04:56.621000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423624"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Directory Server. A heap buffer overflow in the `389-ds-base` component can lead to a denial of service or potential remote code execution. Exploitation requires high privileges on the Directory Server, limiting the attack surface to authenticated administrative users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Directory Server 13.1:registry.redhat.io/dirsrv/dirsrv-container-rhel10@sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "RHBZ#2423624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905"
}
],
"release_date": "2026-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T20:03:51+00:00",
"details": "The container image provided by this update can be downloaded from the Red Hat container registry at registry.redhat.io using the \"podman pull\" command. For more information about the image, search the \u003cimage_name\u003e in the Red Hat Ecosystem Catalog: https://catalog.redhat.com/software/containers/search",
"product_ids": [
"Red Hat Directory Server 13.1:registry.redhat.io/dirsrv/dirsrv-container-rhel10@sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3379"
},
{
"category": "workaround",
"details": "Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.",
"product_ids": [
"Red Hat Directory Server 13.1:registry.redhat.io/dirsrv/dirsrv-container-rhel10@sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Directory Server 13.1:registry.redhat.io/dirsrv/dirsrv-container-rhel10@sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow"
}
]
}
SUSE-SU-2026:0914-1
Vulnerability from csaf_suse - Published: 2026-03-18 07:46 - Updated: 2026-03-18 07:46| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for 389-ds",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for 389-ds fixes the following issues:\n\n- CVE-2025-14905: Fixed heap buffer overflow due to improper size calculation in `schema_attr_enum_callback` callback (bsc#1258727).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-914,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-914,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-914,openSUSE-SLE-15.6-2026-914",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0914-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0914-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260914-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0914-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024710.html"
},
{
"category": "self",
"summary": "SUSE Bug 1258727",
"url": "https://bugzilla.suse.com/1258727"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14905 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14905/"
}
],
"title": "Security update for 389-ds",
"tracking": {
"current_release_date": "2026-03-18T07:46:33Z",
"generator": {
"date": "2026-03-18T07:46:33Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0914-1",
"initial_release_date": "2026-03-18T07:46:33Z",
"revision_history": [
{
"date": "2026-03-18T07:46:33Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"product": {
"name": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"product_id": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"product": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"product_id": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"product": {
"name": "389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"product_id": "389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"product": {
"name": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"product_id": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"product": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"product_id": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"product": {
"name": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"product_id": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"product": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"product_id": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"product": {
"name": "389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"product_id": "389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"product": {
"name": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"product_id": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"product": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"product_id": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"product": {
"name": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"product_id": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.s390x"
}
},
{
"category": "product_version",
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"product": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"product_id": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.s390x"
}
},
{
"category": "product_version",
"name": "389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"product": {
"name": "389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"product_id": "389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.s390x"
}
},
{
"category": "product_version",
"name": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"product": {
"name": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"product_id": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.s390x"
}
},
{
"category": "product_version",
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"product": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"product_id": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"product": {
"name": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"product_id": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"product": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"product_id": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"product": {
"name": "389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"product_id": "389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"product": {
"name": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"product_id": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"product": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"product_id": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64"
},
"product_reference": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le"
},
"product_reference": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.s390x"
},
"product_reference": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64"
},
"product_reference": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64"
},
"product_reference": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le"
},
"product_reference": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.s390x"
},
"product_reference": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64"
},
"product_reference": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64"
},
"product_reference": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le"
},
"product_reference": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.s390x"
},
"product_reference": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64"
},
"product_reference": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64"
},
"product_reference": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le"
},
"product_reference": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.s390x"
},
"product_reference": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64"
},
"product_reference": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le"
},
"product_reference": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64"
},
"product_reference": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le"
},
"product_reference": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64"
},
"product_reference": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le"
},
"product_reference": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64"
},
"product_reference": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le"
},
"product_reference": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64"
},
"product_reference": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64"
},
"product_reference": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le"
},
"product_reference": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.s390x"
},
"product_reference": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64"
},
"product_reference": "389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64"
},
"product_reference": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le"
},
"product_reference": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.s390x"
},
"product_reference": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64"
},
"product_reference": "389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64"
},
"product_reference": "389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le"
},
"product_reference": "389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.s390x"
},
"product_reference": "389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64"
},
"product_reference": "389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64"
},
"product_reference": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le"
},
"product_reference": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.s390x"
},
"product_reference": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64"
},
"product_reference": "lib389-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64"
},
"product_reference": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le"
},
"product_reference": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.s390x"
},
"product_reference": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64"
},
"product_reference": "libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14905",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14905"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"openSUSE Leap 15.6:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"openSUSE Leap 15.6:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"openSUSE Leap 15.6:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"openSUSE Leap 15.6:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"openSUSE Leap 15.6:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"openSUSE Leap 15.6:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"openSUSE Leap 15.6:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"openSUSE Leap 15.6:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"openSUSE Leap 15.6:389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"openSUSE Leap 15.6:389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"openSUSE Leap 15.6:389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"openSUSE Leap 15.6:389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"openSUSE Leap 15.6:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"openSUSE Leap 15.6:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"openSUSE Leap 15.6:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"openSUSE Leap 15.6:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"openSUSE Leap 15.6:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"openSUSE Leap 15.6:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"openSUSE Leap 15.6:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"openSUSE Leap 15.6:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14905",
"url": "https://www.suse.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "SUSE Bug 1258727 for CVE-2025-14905",
"url": "https://bugzilla.suse.com/1258727"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"openSUSE Leap 15.6:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"openSUSE Leap 15.6:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"openSUSE Leap 15.6:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"openSUSE Leap 15.6:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"openSUSE Leap 15.6:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"openSUSE Leap 15.6:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"openSUSE Leap 15.6:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"openSUSE Leap 15.6:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"openSUSE Leap 15.6:389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"openSUSE Leap 15.6:389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"openSUSE Leap 15.6:389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"openSUSE Leap 15.6:389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"openSUSE Leap 15.6:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"openSUSE Leap 15.6:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"openSUSE Leap 15.6:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"openSUSE Leap 15.6:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"openSUSE Leap 15.6:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"openSUSE Leap 15.6:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"openSUSE Leap 15.6:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"openSUSE Leap 15.6:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"openSUSE Leap 15.6:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"openSUSE Leap 15.6:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"openSUSE Leap 15.6:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"openSUSE Leap 15.6:389-ds-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"openSUSE Leap 15.6:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"openSUSE Leap 15.6:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"openSUSE Leap 15.6:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"openSUSE Leap 15.6:389-ds-devel-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"openSUSE Leap 15.6:389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"openSUSE Leap 15.6:389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"openSUSE Leap 15.6:389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"openSUSE Leap 15.6:389-ds-snmp-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"openSUSE Leap 15.6:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"openSUSE Leap 15.6:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"openSUSE Leap 15.6:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"openSUSE Leap 15.6:lib389-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64",
"openSUSE Leap 15.6:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.aarch64",
"openSUSE Leap 15.6:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.ppc64le",
"openSUSE Leap 15.6:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.s390x",
"openSUSE Leap 15.6:libsvrcore0-2.2.10~git200.96444f3c3-150600.8.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T07:46:33Z",
"details": "important"
}
],
"title": "CVE-2025-14905"
}
]
}
SUSE-SU-2026:0913-1
Vulnerability from csaf_suse - Published: 2026-03-18 07:46 - Updated: 2026-03-18 07:46| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for 389-ds",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for 389-ds fixes the following issues:\n\n- CVE-2025-14905: Fixed heap buffer overflow due to improper size calculation in `schema_attr_enum_callback` callback (bsc#1258727).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-913,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-913,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-913,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-913,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-913",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0913-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0913-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260913-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0913-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024711.html"
},
{
"category": "self",
"summary": "SUSE Bug 1258727",
"url": "https://bugzilla.suse.com/1258727"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14905 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14905/"
}
],
"title": "Security update for 389-ds",
"tracking": {
"current_release_date": "2026-03-18T07:46:25Z",
"generator": {
"date": "2026-03-18T07:46:25Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0913-1",
"initial_release_date": "2026-03-18T07:46:25Z",
"revision_history": [
{
"date": "2026-03-18T07:46:25Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"product": {
"name": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"product_id": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64"
}
},
{
"category": "product_version",
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"product": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"product_id": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64"
}
},
{
"category": "product_version",
"name": "389-ds-snmp-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"product": {
"name": "389-ds-snmp-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"product_id": "389-ds-snmp-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64"
}
},
{
"category": "product_version",
"name": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"product": {
"name": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"product_id": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"product": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"product_id": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"product": {
"name": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"product_id": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le"
}
},
{
"category": "product_version",
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"product": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"product_id": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le"
}
},
{
"category": "product_version",
"name": "389-ds-snmp-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"product": {
"name": "389-ds-snmp-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"product_id": "389-ds-snmp-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"product": {
"name": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"product_id": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"product": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"product_id": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"product": {
"name": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"product_id": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.s390x"
}
},
{
"category": "product_version",
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"product": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"product_id": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.s390x"
}
},
{
"category": "product_version",
"name": "389-ds-snmp-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"product": {
"name": "389-ds-snmp-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"product_id": "389-ds-snmp-2.2.10~git200.96444f3c3-150500.3.42.1.s390x"
}
},
{
"category": "product_version",
"name": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"product": {
"name": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"product_id": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.s390x"
}
},
{
"category": "product_version",
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"product": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"product_id": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"product": {
"name": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"product_id": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"product": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"product_id": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "389-ds-snmp-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"product": {
"name": "389-ds-snmp-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"product_id": "389-ds-snmp-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"product": {
"name": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"product_id": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"product": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"product_id": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64"
},
"product_reference": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64"
},
"product_reference": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64"
},
"product_reference": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64"
},
"product_reference": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64"
},
"product_reference": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64"
},
"product_reference": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64"
},
"product_reference": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64"
},
"product_reference": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64"
},
"product_reference": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64"
},
"product_reference": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64"
},
"product_reference": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64"
},
"product_reference": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64"
},
"product_reference": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64"
},
"product_reference": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64"
},
"product_reference": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64"
},
"product_reference": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64"
},
"product_reference": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le"
},
"product_reference": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.s390x"
},
"product_reference": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64"
},
"product_reference": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64"
},
"product_reference": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le"
},
"product_reference": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.s390x"
},
"product_reference": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64"
},
"product_reference": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64"
},
"product_reference": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le"
},
"product_reference": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.s390x"
},
"product_reference": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64"
},
"product_reference": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64"
},
"product_reference": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le"
},
"product_reference": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.s390x"
},
"product_reference": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64"
},
"product_reference": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le"
},
"product_reference": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64"
},
"product_reference": "389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le"
},
"product_reference": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64"
},
"product_reference": "389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le"
},
"product_reference": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64"
},
"product_reference": "lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le"
},
"product_reference": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64"
},
"product_reference": "libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14905",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14905"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14905",
"url": "https://www.suse.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "SUSE Bug 1258727 for CVE-2025-14905",
"url": "https://bugzilla.suse.com/1258727"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:389-ds-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:389-ds-devel-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:lib389-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libsvrcore0-2.2.10~git200.96444f3c3-150500.3.42.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T07:46:25Z",
"details": "important"
}
],
"title": "CVE-2025-14905"
}
]
}
SUSE-SU-2026:20927-1
Vulnerability from csaf_suse - Published: 2026-03-24 17:50 - Updated: 2026-03-24 17:50| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for 389-ds",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for 389-ds fixes the following issue:\n\nUpdate to 389-ds 3.0.6~git249.6688af9b2:\n\n- CVE-2025-14905: heap buffer overflow due to improper size calculation in `schema_attr_enum_callback` can lead to DoS\n and RCE (bsc#1258727).\n\nChangelog:\n\n * Issue 7277 - UI - Fix Japanese translation for \"Successfully updated group\" in Cockpit UI (#7278)\n * Issue 7275 - UI - Improve password policy field validation in Cockpit UI (#7276)\n * Issue 7279 - UI - Fix typo in export certificate dialog (#7280)\n * Issue 7273 - In a chaining environment binding as remote user causes an invalid error in the logs\n * Issue 7271 - plugins that create threads need to update active thread count\n * Issue 5853 - Update concread to 0.5.10\n * Issue 7053 - Remove memberof_del_dn_from_groups from MemberOf plugin (#7064)\n * Issue 7223 - Remove integerOrderingMatch requirement for parentid (#7264)\n * Issue 7066/7052 - allow password history to be set to zero and remove history\n * Issue 7223 - Use lexicographical order for ancestorid (#7256)\n * Issue 7213 - (2nd) MDB_BAD_VALSIZE error while handling VLV (#7258)\n * Issue 7184 - (2nd) argparse.HelpFormatter _format_actions_usage() is deprecated (#7257)\n * Issue - CLI - dsctl db2index needs some hardening with MBD\n * Issue 7248 - CLI - attribute uniqueness - fix usage for exclude subtree option\n * Issue 7231 - Sync repl tests fail in FIPS mode due to non FIPS compliant crypto (#7232)\n * Issue 7121 - (2nd) LeakSanitizer: various leaks during replication (#7212)\n * Issue 6947 - Fix health_system_indexes_test.py\n * Issue 7076 - Fix revert_cache() never called in modrdn (#7220)\n * Issue 7076, 6992, 6784, 6214 - Fix CI test failures (#7077)\n * Issue 7096 - (2nd) During replication online total init the function idl_id_is_in_idlist is not scaling with large\n database (#7205)\n * Issue 3555 - UI - Fix audit issue with npm - @isaacs/brace-expansion (#7228)\n * Issue 7223 - Add dsctl index-check command for offline index repair\n * Issue 7223 - Detect and log index ordering mismatch during backend startup\n * Issue 7223 - Add upgrade function to remove ancestorid index config entry\n * Issue 7223 - Add upgrade function to remove nsIndexIDListScanLimit from parentid\n * Issue 7223 - Revert index scan limits for system indexes\n * Issue 6542 - RPM build errors on Fedora 42\n * Issue 7224 - CI Test - Simplify test_reserve_descriptor_validation (#7225)\n * Issue 7194 - Repl Log Analysis - Add CSN propagation details (#7195)\n * Issue 7213 - MDB_BAD_VALSIZE error while handling VLV (#7214)\n * Issue 7027 - (2nd) 389-ds-base OpenScanHub Leaks Detected (#7211)\n * Issue 7184 - argparse.HelpFormatter _format_actions_usage() is deprecated\n * Issue 7198 - Web console doesn\u0027t show sub-suffix when parent-suffix points to an entry (#7202)\n * Issue 7189 - DSBLE0007 generates incorrect remediation commands for scan limits\n * Bump lodash from 4.17.21 to 4.17.23 in /src/cockpit/389-console (#7203)\n * Issue 7172 - (2nd) Index ordering mismatch after upgrade (#7180)\n * Issue 7172 - Index ordering mismatch after upgrade (#7173)\n * Issue - Revise paged result search locking\n * Issue 7096 - During replication online total init the function idl_id_is_in_idlist is not scaling with large\n database (#7145)\n * Revert \"Issue 7160 - Add lib389 version sync check to configure (#7165)\"\n * Issue 7160 - Add lib389 version sync check to configure (#7165)\n * Issue 7049 - RetroCL plugin generates invalid LDIF\n * Issue 7150 - Compressed access log rotations skipped, accesslog-list out of sync (#7151)\n * Restore definition for slapi_entry_attr_get_valuearray\n * Issue 1793 - RFE - Dynamic lists - UI and CLI updates\n * Issue 7119 - Fix DNA shared config replication test (#7143)\n * Issue 7081 - Repl Log Analysis - Implement data sampling with performance and timezone fixes (#7086)\n * Issue 1793 - RFE - Implement dynamic lists\n * Issue 6753 - Port ticket tests\n * Issue 6753 - Port and fix ticket 47823 tests\n * Issue 6753 - Add \u0027add_exclude_subtree\u0027 and \u0027remove_exclude_subtree\u0027 methods to Attribute uniqueness plugin\n * Issue 6753 - Port ticket test 48026\n * Issue 7128 - memory corruption in alias entry plugin (#7131)\n * Issue 7091 - Duplicate local password policy entries listed (#7092)\n * Issue 7124 - BDB cursor race condition with transaction isolation (#7125)\n * Issue 7132 - Keep alive entry updated too soon after an offline import (#7133)\n * Issue 7121 - LeakSanitizer: various leaks during replication (#7122)\n * Issue 7115 - LeakSanitizer: leak in `slapd_bind_local_user()` (#7116)\n * Issue 7109 - AddressSanitizer: SEGV ldap/servers/slapd/csnset.c:302 in csnset_dup (#7114)\n * Issue 7056 - DSBLE0007 doesn\u0027t generate remediation steps for missing indexes\n * Issue 7119 - Harden DNA plugin locking for shared server list operations (#7120)\n * Issue 7084 - UI - schema - sorting attributes breaks expanded row\n * Issue 7007 - Improve paged result search locking\n * Issue 3555 - UI - Fix audit issue with npm - glob (#7107)\n * Issue 6846 - Attribute uniqueness is not enforced with modrdn (#7026)\n * Issue 6901 - Update changelog trimming logging - fix tests\n * Issue 6901 - Update changelog trimming logging\n * Bump js-yaml from 4.1.0 to 4.1.1 in /src/cockpit/389-console (#7097)\n * Issue 7069 - Fix error reporting in HAProxy trusted IP parsing (#7094)\n * Issue 7055 - Online initialization of consumers fails with error -23 (#7075)\n * Issue 7042 - Enable global_backend_lock when memberofallbackend is enabled (#7043)\n * Issue 7078 - audit json logging does not encode binary values\n * Issue 7069 - Add Subnet/CIDR Support for HAProxy Trusted IPs (#7070)\n * Issue 6660 - CLI, UI - Improve replication log analyzer usability (#7062)\n * Issue 7065 - A search filter containing a non normalized DN assertion does not return matching entries (#7068)\n * Issue 7071 - search filter (\u0026(cn:dn:=groups)) no longer returns results\n * Issue 7073 - Add NDN cache size configuration and enforcement tests (#7074)\n * Issue 7041 - CLI/UI - memberOf - no way to add/remove specific group filters\n * Issue 7061 - CLI/UI - Improve error messages for dsconf localpwp list\n * Issue 7059 - UI - unable to upload pem file\n * Issue 7032 - The new ipahealthcheck test ipahealthcheck.ds.backends.BackendsCheck raises CRITICAL issue (#7036)\n * Issue 7047 - MemberOf plugin logs null attribute name on fixup task completion (#7048)\n * Issue 7044 - RFE - index sudoHost by default (#7046)\n * Issue 6979 - Improve the way to detect asynchronous operations in the access logs (#6980)\n * Issue 7035 - RFE - memberOf - adding scoping for specific groups\n * Issue - CLI/UI - Add option to delete all replication conflict entries\n * Issue 7033 - lib389 - basic plugin status not in JSON\n * Issue 7023 - UI - if first instance that is loaded is stopped it breaks parts of the UI\n * Issue 7027 - 389-ds-base OpenScanHub Leaks Detected (#7028)\n * Issue 6966 - On large DB, unlimited IDL scan limit reduce the SRCH performance (#6967)\n * Issue 6660 - UI - Improve replication log analysis charts and usability (#6968)\n * Issue 6982 - UI - MemberOf shared config does not validate DN properly (#6983)\n * Issue 7021 - Units for changing MDB max size are not consistent across different tools (#7022)\n * Issue 6954 - do not delete referrals on chain_on_update backend\n * Issue 7018 - BUG - prevent stack depth being hit (#7019)\n * Issue 6928 - The parentId attribute is indexed with improper matching rule\n * Issue 6933 - When deferred memberof update is enabled after the server crashed it should not launch memberof fixup\n task by default (#6935)\n * Issue 6904 - Fix config_test.py::test_lmdb_config\n * Issue 7014 - memberOf - ignored deferred updates with LMDB\n * Issue 7012 - improve dscrl dbverify result when backend does not exists (#7013)\n * Issue 6929 - Compilation failure with rust-1.89 on Fedora ELN\n * Issue 6990 - UI - Replace deprecated Select components with new TypeaheadSelect (#6996)\n * Issue 6990 - UI - Fix typeahead Select fields losing values on Enter keypress (#6991)\n * Issue 6887 - Enhance logconv.py to add support for JSON access logs (#6889)\n * Issue 6985 - Some logconv CI tests fail with BDB (#6986)\n * Issue 6891 - JSON logging - add wrapper function that checks for NULL\n * Issue 6977 - UI - Show error message when trying to use unavailable ports (#6978)\n * Issue 6956 - More UI fixes\n * Issue 6947 - Revise time skew check in healthcheck tool and add option to exclude checks\n * Issue 6805 - RFE - Multiple backend entry cache tuning\n * Issue 6843 - Add CI tests for logconv.py (#6856)\n * Issue - UI - update Radio handlers and LDAP entries last modified time\n * Issue 6660 - UI - Fix minor typo (#6955)\n * Issue 6910 - Fix latest coverity issues\n * Issue 6919 - numSubordinates/tombstoneNumSubordinates are inconsisten... (#6920)\n * Issue 6663 - Fix NULL subsystem crash in JSON error logging (#6883)\n * Issue 6940 - dsconf monitor server fails with ldapi:// due to absent server ID (#6941)\n * Issue 6936 - Make user/subtree policy creation idempotent (#6937)\n * Issue 6865 - AddressSanitizer: leak in agmt_update_init_status\n * Issue 6848 - AddressSanitizer: leak in do_search\n * Issue 6850 - AddressSanitizer: memory leak in mdb_init\n * Issue 6778 - Memory leak in roles_cache_create_object_from_entry part 2\n * Issue 6778 - Memory leak in roles_cache_create_object_from_entry\n * Issue 6181 - RFE - Allow system to manage uid/gid at startup\n * Issues 6913, 6886, 6250 - Adjust xfail marks (#6914)\n * Issue 6768 - ns-slapd crashes when a referral is added (#6780)\n * Issue 6468 - CLI - Fix default error log level\n * Issue 6339 - Address Coverity scan issues in memberof and bdb_layer (#6353)\n * Issue 6897 - Fix disk monitoring test failures and improve test maintainability (#6898)\n * Issue 6884 - Mask password hashes in audit logs (#6885)\n * Issue 6594 - Add test for numSubordinates replication consistency with tombstones (#6862)\n * Issue 6250 - Add test for entryUSN overflow on failed add operations (#6821)\n * Issue 6895 - Crash if repl keep alive entry can not be created\n * Issue 6893 - Log user that is updated during password modify extended operation\n * Issue 6772 - dsconf - Replicas with the \"consumer\" role allow for viewing and modification of their\n changelog. (#6773)\n * Issue 6888 - Missing access JSON logging for TLS/Client auth\n * Issue 6680 - instance read-only mode is broken (#6681)\n * Issue 6878 - Prevent repeated disconnect logs during shutdown (#6879)\n * Issue 6872 - compressed log rotation creates files with world readable permission\n * Issue 6859 - str2filter is not fully applying matching rules\n * Issue 6868 - UI - schema attribute table expansion break after moving to a new page\n * Issue 6854 - Refactor for improved data management (#6855)\n * Issue 6756 - CLI, UI - Properly handle disabled NDN cache (#6757)\n * Issue 6857 - uiduniq: allow specifying match rules in the filter\n * Issue 6838 - lib389/replica.py is using nonexistent datetime.UTC in Python 3.9\n * Issue 6822 - Backend creation cleanup and Database UI tab error handling (#6823)\n * Issue 6782 - Improve paged result locking\n * Issue 6825 - RootDN Access Control Plugin with wildcards for IP addre... (#6826)\n * Issue 6736 - Exception thrown by dsconf instance repl get_ruv (#6742)\n * Issue 6819 - Incorrect pwdpolicysubentry returned for an entry with user password policy\n * Issue 6553 - Update concread to 0.5.6 (#6824)\n * Issue 1081 - Add a CI test (#6063)\n * Issue 6761 - Password modify extended operation should skip password policy checks when executed by root DN\n * Issue 6791 - crash in liblmdb during instance shutdown (#6793)\n * Issue 6641 - modrdn fails when a user is member of multiple groups (#6643)\n * Issue 6776 - Enabling audit log makes slapd coredump\n * Issue 6534 - CI fails with Fedora 41 and DNF5\n * Issue 6787 - Improve error message when bulk import connection is closed\n * Issue 6727 - RFE - database compaction interval should be persistent\n * Issue 6438 - Add basic dsidm organizational unit tests\n * Issue 6439 - Fix dsidm service get_dn option\n * Issue 5120 - ns-slapd doesn\u0027t start in referral mode (#6763)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-434",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20927-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20927-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620927-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20927-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/045225.html"
},
{
"category": "self",
"summary": "SUSE Bug 1258727",
"url": "https://bugzilla.suse.com/1258727"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14905 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14905/"
}
],
"title": "Security update for 389-ds",
"tracking": {
"current_release_date": "2026-03-24T17:50:31Z",
"generator": {
"date": "2026-03-24T17:50:31Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20927-1",
"initial_release_date": "2026-03-24T17:50:31Z",
"revision_history": [
{
"date": "2026-03-24T17:50:31Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"product": {
"name": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"product_id": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"product": {
"name": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"product_id": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"product": {
"name": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"product_id": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "lib389-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"product": {
"name": "lib389-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"product_id": "lib389-3.0.6~git249.6688af9b2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"product": {
"name": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"product_id": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"product": {
"name": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"product_id": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"product": {
"name": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"product_id": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"product": {
"name": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"product_id": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lib389-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"product": {
"name": "lib389-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"product_id": "lib389-3.0.6~git249.6688af9b2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"product": {
"name": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"product_id": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"product": {
"name": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"product_id": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"product": {
"name": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"product_id": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"product": {
"name": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"product_id": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "lib389-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"product": {
"name": "lib389-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"product_id": "lib389-3.0.6~git249.6688af9b2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"product": {
"name": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"product_id": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"product": {
"name": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"product_id": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"product": {
"name": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"product_id": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"product": {
"name": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"product_id": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "lib389-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"product": {
"name": "lib389-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"product_id": "lib389-3.0.6~git249.6688af9b2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"product": {
"name": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"product_id": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server-sap"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.aarch64"
},
"product_reference": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.ppc64le"
},
"product_reference": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.s390x"
},
"product_reference": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.x86_64"
},
"product_reference": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.aarch64"
},
"product_reference": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.ppc64le"
},
"product_reference": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.s390x"
},
"product_reference": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.x86_64"
},
"product_reference": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.aarch64"
},
"product_reference": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.ppc64le"
},
"product_reference": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.s390x"
},
"product_reference": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.x86_64"
},
"product_reference": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-3.0.6~git249.6688af9b2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.aarch64"
},
"product_reference": "lib389-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-3.0.6~git249.6688af9b2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.ppc64le"
},
"product_reference": "lib389-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-3.0.6~git249.6688af9b2-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.s390x"
},
"product_reference": "lib389-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-3.0.6~git249.6688af9b2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.x86_64"
},
"product_reference": "lib389-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.aarch64"
},
"product_reference": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.ppc64le"
},
"product_reference": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.s390x"
},
"product_reference": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.x86_64"
},
"product_reference": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.aarch64"
},
"product_reference": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.ppc64le"
},
"product_reference": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.s390x"
},
"product_reference": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.x86_64"
},
"product_reference": "389-ds-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.aarch64"
},
"product_reference": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.ppc64le"
},
"product_reference": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.s390x"
},
"product_reference": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.x86_64"
},
"product_reference": "389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.aarch64"
},
"product_reference": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.ppc64le"
},
"product_reference": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.s390x"
},
"product_reference": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.x86_64"
},
"product_reference": "389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-3.0.6~git249.6688af9b2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.aarch64"
},
"product_reference": "lib389-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-3.0.6~git249.6688af9b2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.ppc64le"
},
"product_reference": "lib389-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-3.0.6~git249.6688af9b2-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.s390x"
},
"product_reference": "lib389-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-3.0.6~git249.6688af9b2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.x86_64"
},
"product_reference": "lib389-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.aarch64"
},
"product_reference": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.ppc64le"
},
"product_reference": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.s390x"
},
"product_reference": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.x86_64"
},
"product_reference": "libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14905",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14905"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14905",
"url": "https://www.suse.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "SUSE Bug 1258727 for CVE-2025-14905",
"url": "https://bugzilla.suse.com/1258727"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:lib389-3.0.6~git249.6688af9b2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-24T17:50:31Z",
"details": "important"
}
],
"title": "CVE-2025-14905"
}
]
}
SUSE-SU-2026:0915-1
Vulnerability from csaf_suse - Published: 2026-03-18 07:46 - Updated: 2026-03-18 07:46| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for 389-ds",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for 389-ds fixes the following issues:\n\nUpdate to LTS branch 2.7 (jsc#PED-14342):\n\n- CVE-2025-14905: Fixed heap buffer overflow due to improper size calculation in `schema_attr_enum_callback` callback (bsc#1258727).\n\nBug fixes:\n\n- Resolve python build error that caused lib389 to be missing some libraries. (bsc#1258689)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-915,SUSE-SLE-Module-Server-Applications-15-SP7-2026-915",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0915-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0915-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260915-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0915-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024709.html"
},
{
"category": "self",
"summary": "SUSE Bug 1258689",
"url": "https://bugzilla.suse.com/1258689"
},
{
"category": "self",
"summary": "SUSE Bug 1258727",
"url": "https://bugzilla.suse.com/1258727"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14905 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14905/"
}
],
"title": "Security update for 389-ds",
"tracking": {
"current_release_date": "2026-03-18T07:46:51Z",
"generator": {
"date": "2026-03-18T07:46:51Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0915-1",
"initial_release_date": "2026-03-18T07:46:51Z",
"revision_history": [
{
"date": "2026-03-18T07:46:51Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"product": {
"name": "389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"product_id": "389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64"
}
},
{
"category": "product_version",
"name": "389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"product": {
"name": "389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"product_id": "389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64"
}
},
{
"category": "product_version",
"name": "389-ds-snmp-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"product": {
"name": "389-ds-snmp-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"product_id": "389-ds-snmp-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64"
}
},
{
"category": "product_version",
"name": "lib389-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"product": {
"name": "lib389-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"product_id": "lib389-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"product": {
"name": "libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"product_id": "libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"product": {
"name": "389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"product_id": "389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"product": {
"name": "389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"product_id": "389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "389-ds-snmp-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"product": {
"name": "389-ds-snmp-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"product_id": "389-ds-snmp-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lib389-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"product": {
"name": "lib389-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"product_id": "lib389-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"product": {
"name": "libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"product_id": "libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"product": {
"name": "389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"product_id": "389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.s390x"
}
},
{
"category": "product_version",
"name": "389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"product": {
"name": "389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"product_id": "389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.s390x"
}
},
{
"category": "product_version",
"name": "389-ds-snmp-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"product": {
"name": "389-ds-snmp-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"product_id": "389-ds-snmp-2.7.0~git144.f597a91d8-150700.3.13.1.s390x"
}
},
{
"category": "product_version",
"name": "lib389-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"product": {
"name": "lib389-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"product_id": "lib389-2.7.0~git144.f597a91d8-150700.3.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"product": {
"name": "libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"product_id": "libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64",
"product": {
"name": "389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64",
"product_id": "389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64",
"product": {
"name": "389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64",
"product_id": "389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "389-ds-snmp-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64",
"product": {
"name": "389-ds-snmp-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64",
"product_id": "389-ds-snmp-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "lib389-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64",
"product": {
"name": "lib389-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64",
"product_id": "lib389-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64",
"product": {
"name": "libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64",
"product_id": "libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64"
},
"product_reference": "389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le"
},
"product_reference": "389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.s390x"
},
"product_reference": "389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64"
},
"product_reference": "389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64"
},
"product_reference": "389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le"
},
"product_reference": "389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.s390x"
},
"product_reference": "389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64"
},
"product_reference": "389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:lib389-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64"
},
"product_reference": "lib389-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:lib389-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le"
},
"product_reference": "lib389-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-2.7.0~git144.f597a91d8-150700.3.13.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:lib389-2.7.0~git144.f597a91d8-150700.3.13.1.s390x"
},
"product_reference": "lib389-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lib389-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:lib389-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64"
},
"product_reference": "lib389-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64"
},
"product_reference": "libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le"
},
"product_reference": "libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.s390x"
},
"product_reference": "libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64"
},
"product_reference": "libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14905",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14905"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:lib389-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:lib389-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:lib389-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:lib389-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14905",
"url": "https://www.suse.com/security/cve/CVE-2025-14905"
},
{
"category": "external",
"summary": "SUSE Bug 1258727 for CVE-2025-14905",
"url": "https://bugzilla.suse.com/1258727"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:lib389-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:lib389-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:lib389-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:lib389-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:389-ds-devel-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:lib389-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:lib389-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:lib389-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:lib389-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:libsvrcore0-2.7.0~git144.f597a91d8-150700.3.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T07:46:51Z",
"details": "important"
}
],
"title": "CVE-2025-14905"
}
]
}
WID-SEC-W-2026-0494
Vulnerability from csaf_certbund - Published: 2026-02-23 23:00 - Updated: 2026-03-30 22:00| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux ausnutzen, um beliebigen Programmcode auszuf\u00fchren, und potenziell um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0494 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0494.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0494 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0494"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3189 vom 2026-02-23",
"url": "https://access.redhat.com/errata/RHSA-2026:3189"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3208 vom 2026-02-24",
"url": "https://access.redhat.com/errata/RHSA-2026:3208"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3208 vom 2026-02-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-3208.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3189 vom 2026-02-25",
"url": "http://linux.oracle.com/errata/ELSA-2026-3189.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3208 vom 2026-02-25",
"url": "http://linux.oracle.com/errata/ELSA-2026-3208.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3189 vom 2026-02-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-3189.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3379 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3379"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3208 vom 2026-02-26",
"url": "https://errata.build.resf.org/RLSA-2026:3208"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3189 vom 2026-02-26",
"url": "https://errata.build.resf.org/RLSA-2026:3189"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3504 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3504"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4207 vom 2026-03-11",
"url": "https://access.redhat.com/errata/RHSA-2026:4207"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4661 vom 2026-03-17",
"url": "https://access.redhat.com/errata/RHSA-2026:4661"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4720 vom 2026-03-17",
"url": "https://access.redhat.com/errata/RHSA-2026:4720"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0913-1 vom 2026-03-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024711.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0915-1 vom 2026-03-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024709.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0914-1 vom 2026-03-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024710.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3205 vom 2026-03-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3205.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5196 vom 2026-03-23",
"url": "https://access.redhat.com/errata/RHSA-2026:5196"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5513 vom 2026-03-24",
"url": "https://access.redhat.com/errata/RHSA-2026:5513"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5569 vom 2026-03-24",
"url": "https://access.redhat.com/errata/RHSA-2026:5569"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5568 vom 2026-03-24",
"url": "https://access.redhat.com/errata/RHSA-2026:5568"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5511 vom 2026-03-24",
"url": "https://access.redhat.com/errata/RHSA-2026:5511"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5512 vom 2026-03-24",
"url": "https://access.redhat.com/errata/RHSA-2026:5512"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5514 vom 2026-03-24",
"url": "https://access.redhat.com/errata/RHSA-2026:5514"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5576 vom 2026-03-24",
"url": "https://access.redhat.com/errata/RHSA-2026:5576"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5597 vom 2026-03-24",
"url": "https://access.redhat.com/errata/RHSA-2026:5597"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5598 vom 2026-03-24",
"url": "https://access.redhat.com/errata/RHSA-2026:5598"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-5513 vom 2026-03-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-5513.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20415-1 vom 2026-03-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLAAABI2RE4P7V7AN2CVE7GZQWPV5GJW/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:6220 vom 2026-03-31",
"url": "https://access.redhat.com/errata/RHSA-2026:6220"
}
],
"source_lang": "en-US",
"title": "Red Hat Enterprise Linux (389-ds-base): Schwachstelle erm\u00f6glicht Codeausf\u00fchrung und potenziell Denial of Service",
"tracking": {
"current_release_date": "2026-03-30T22:00:00.000+00:00",
"generator": {
"date": "2026-03-31T08:19:40.147+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0494",
"initial_release_date": "2026-02-23T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-02-23T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-02-24T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat, European Union Vulnerability Database und Oracle Linux aufgenommen"
},
{
"date": "2026-02-25T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-26T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-03-01T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-10T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-16T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-17T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-18T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-19T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2026-03-22T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-23T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-24T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-03-29T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-03-30T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "15"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "9",
"product": {
"name": "Red Hat Enterprise Linux 9",
"product_id": "T051125",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14905",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T027843",
"T051125",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-02-23T23:00:00.000+00:00",
"title": "CVE-2025-14905"
}
]
}
alsa-2026:3208
Vulnerability from osv_almalinux
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.
Security Fix(es):
- 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "389-ds-base"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.1.3-7.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "389-ds-base-bdb"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.1.3-7.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "389-ds-base-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.1.3-7.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "389-ds-base-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.1.3-7.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "389-ds-base-snmp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.1.3-7.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "python3-lib389"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.1.3-7.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. \n\nSecurity Fix(es): \n\n * 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2026:3208",
"modified": "2026-02-26T10:30:07Z",
"published": "2026-02-24T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2026:3208"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2423624"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/10/ALSA-2026-3208.html"
}
],
"related": [
"CVE-2025-14905"
],
"summary": "Moderate: 389-ds-base security update"
}
alsa-2026:3189
Vulnerability from osv_almalinux
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.
Security Fix(es):
- 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "389-ds-base"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.7.0-10.el9_7"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "389-ds-base-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.7.0-10.el9_7"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "389-ds-base-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.7.0-10.el9_7"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "389-ds-base-snmp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.7.0-10.el9_7"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "python3-lib389"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.7.0-10.el9_7"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. \n\nSecurity Fix(es): \n\n * 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2026:3189",
"modified": "2026-02-26T10:31:32Z",
"published": "2026-02-24T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2026:3189"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2423624"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2026-3189.html"
}
],
"related": [
"CVE-2025-14905"
],
"summary": "Moderate: 389-ds-base security update"
}
alsa-2026:5513
Vulnerability from osv_almalinux
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.
Security Fix(es):
- 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "389-ds-base"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.4.3.39-23.module_el8.10.0+4139+ef6adba4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "389-ds-base-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.4.3.39-23.module_el8.10.0+4139+ef6adba4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "389-ds-base-legacy-tools"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.4.3.39-23.module_el8.10.0+4139+ef6adba4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "389-ds-base-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.4.3.39-23.module_el8.10.0+4139+ef6adba4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "389-ds-base-snmp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.4.3.39-23.module_el8.10.0+4139+ef6adba4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "python3-lib389"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.4.3.39-23.module_el8.10.0+4139+ef6adba4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. \n\nSecurity Fix(es): \n\n * 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2026:5513",
"modified": "2026-03-26T11:22:25Z",
"published": "2026-03-24T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2026:5513"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2423624"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2026-5513.html"
}
],
"related": [
"CVE-2025-14905"
],
"summary": "Moderate: 389-ds:1.4 security update"
}
FKIE_CVE-2025-14905
Vulnerability from fkie_nvd - Published: 2026-02-23 16:29 - Updated: 2026-03-31 16:16| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:3189 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:3208 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:3379 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:3504 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:4207 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:4661 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:4720 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:5196 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:5511 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:5512 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:5513 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:5514 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:5568 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:5569 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:5576 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:5597 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:5598 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:6220 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:6268 | ||
| secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2025-14905 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2423624 |
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE)."
},
{
"lang": "es",
"value": "Se encontr\u00f3 un defecto en el servidor 389-ds-base. Existe una vulnerabilidad de desbordamiento de b\u00fafer de mont\u00edculo en la funci\u00f3n \u0027schema_attr_enum_callback\u0027 dentro del archivo \u0027schema.c\u0027. Esto ocurre porque el c\u00f3digo calcula incorrectamente el tama\u00f1o del b\u00fafer al sumar las longitudes de las cadenas de alias sin tener en cuenta los caracteres de formato adicionales. Cuando se procesa un gran n\u00famero de alias, este descuido puede conducir a un desbordamiento de mont\u00edculo, lo que podr\u00eda permitir a un atacante remoto causar una denegaci\u00f3n de servicio (DoS) o lograr ejecuci\u00f3n remota de c\u00f3digo (RCE)."
}
],
"id": "CVE-2025-14905",
"lastModified": "2026-03-31T16:16:27.923",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
},
"published": "2026-02-23T16:29:35.620",
"references": [
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:3189"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:3208"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:3379"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:3504"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:4207"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:4661"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:4720"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:5196"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:5511"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:5512"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:5513"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:5514"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:5568"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:5569"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:5576"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:5597"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:5598"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:6220"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:6268"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-122"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
}
GHSA-Q4HC-VP2M-FR47
Vulnerability from github – Published: 2026-02-23 18:32 – Updated: 2026-03-31 18:31A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the schema_attr_enum_callback function within the schema.c file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
{
"affected": [],
"aliases": [
"CVE-2025-14905"
],
"database_specific": {
"cwe_ids": [
"CWE-122"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-02-23T16:29:35Z",
"severity": "HIGH"
},
"details": "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).",
"id": "GHSA-q4hc-vp2m-fr47",
"modified": "2026-03-31T18:31:25Z",
"published": "2026-02-23T18:32:02Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14905"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2025-14905"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:6268"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:6220"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:5598"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:5597"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:5576"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:5569"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:5568"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:5514"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:5513"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:5512"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:5511"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:5196"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:4720"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:4661"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:4207"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:3504"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:3379"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:3208"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:3189"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.