{"id":"RLSA-2021:3079","summary":"Low: 389-ds:1.4 security and bug fix update","details":"389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. \n\nSecurity Fix(es):\n\n* 389-ds-base: CRYPT password hash with asterisk allows any bind attempt to succeed (CVE-2021-3652)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* A plugin can create an index. Even if the index can be used immediately (for searches) the index remains offline until further reindex (BZ#1983095)\n\n* On big endian machine, the server fails to identify the operation type (BZ#1980063)","modified":"2026-02-05T00:00:04.915105Z","published":"2021-08-10T12:01:08Z","upstream":["CVE-2021-3652"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2021:3079"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1980063"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1982782"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1983095"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1984091"}],"affected":[{"package":{"name":"389-ds-base","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/389-ds-base?distro=rocky-linux-8-4-legacy&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.4.3.16-19.module+el8.4.0+636+837ee950"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2021:3079.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}