A 389-ds:1.4 security update has been released for AlmaLinux 8.
ALSA-2022:7133 Moderate: 389-ds:1.4 security update
Type:
security
Severity:
moderate
Release date:
2022-10-27
Description
Security Fix(es):
* 389-ds-base: SIGSEGV in sync_repl (CVE-2022-2850)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
References:
RHSA-2022:7133
CVE-2022-2850
ALSA-2022:7133
Updates packages:
python3-lib389-1.4.3.28-8.module_el8.6.0+3338+ebccfef1.noarch.rpm
389-ds-base-legacy-tools-1.4.3.28-8.module_el8.6.0+3338+ebccfef1.aarch64.rpm
389-ds-base-snmp-1.4.3.28-8.module_el8.6.0+3338+ebccfef1.aarch64.rpm
389-ds-base-devel-1.4.3.28-8.module_el8.6.0+3338+ebccfef1.aarch64.rpm
389-ds-base-libs-1.4.3.28-8.module_el8.6.0+3338+ebccfef1.aarch64.rpm
389-ds-base-1.4.3.28-8.module_el8.6.0+3338+ebccfef1.aarch64.rpm
389-ds-base-snmp-1.4.3.28-8.module_el8.6.0+3338+ebccfef1.s390x.rpm
389-ds-base-devel-1.4.3.28-8.module_el8.6.0+3338+ebccfef1.s390x.rpm
389-ds-base-libs-1.4.3.28-8.module_el8.6.0+3338+ebccfef1.s390x.rpm
389-ds-base-legacy-tools-1.4.3.28-8.module_el8.6.0+3338+ebccfef1.s390x.rpm
389-ds-base-1.4.3.28-8.module_el8.6.0+3338+ebccfef1.s390x.rpm
389-ds-base-libs-1.4.3.28-8.module_el8.6.0+3338+ebccfef1.x86_64.rpm
389-ds-base-1.4.3.28-8.module_el8.6.0+3338+ebccfef1.x86_64.rpm
389-ds-base-devel-1.4.3.28-8.module_el8.6.0+3338+ebccfef1.x86_64.rpm
389-ds-base-legacy-tools-1.4.3.28-8.module_el8.6.0+3338+ebccfef1.x86_64.rpm
389-ds-base-snmp-1.4.3.28-8.module_el8.6.0+3338+ebccfef1.x86_64.rpm
389-ds-base-libs-1.4.3.28-8.module_el8.6.0+3338+ebccfef1.ppc64le.rpm
389-ds-base-snmp-1.4.3.28-8.module_el8.6.0+3338+ebccfef1.ppc64le.rpm
389-ds-base-1.4.3.28-8.module_el8.6.0+3338+ebccfef1.ppc64le.rpm
389-ds-base-legacy-tools-1.4.3.28-8.module_el8.6.0+3338+ebccfef1.ppc64le.rpm
389-ds-base-devel-1.4.3.28-8.module_el8.6.0+3338+ebccfef1.ppc64le.rpm
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.