- Issued:
- 2015-07-22
- Updated:
- 2015-07-22
RHBA-2015:1480 - Bug Fix Advisory
Synopsis
Red Hat Directory Server bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated Red Hat Directory Server packages that fix several bugs and add various
enhancements are now available for Red Hat Directory Server 9.
Description
Red Hat Directory Server is an LDAPv3-compliant directory server. The suite of
packages includes the Lightweight Directory Access Protocol (LDAP) server and
command-line utilities for server administration, the Administration Server HTTP
agent package, and the GUI console packages.
The following packages have been upgraded to version RHDS9.1.1.: 389-ds-console,
389-admin-console, 389-admin, 389-adminutil, 389-console, redhat-ds-console,
redhat-admin-console, redhat-ds-admin, idm-console-framework, redhat-ds,
redhat-ds-base, and redhat-idm-console. The most notable bug fixes and
enhancements include:
- Importing a certificate authority (CA) certificate using the Console when a CA
certificate with the same name already exists in the certificate database no
longer causes the security common gateway interface (CGI) to terminate
unexpectedly.
- Clicking the "Manage Certificates" button in the Console after installing a
certificate no longer causes the Admin Server to terminate unexpectedly.
- The Directory Server can now be restarted as expected from the Console after
adding and removing certificates for SSL.
- Reconfiguring the Admin Server no longer overwrites the security files, thus
no longer breaking SSL. It is recommended to back up the security files when
reconfiguring and restore them at the end of reconfiguration.
- When editing Application Centric Infrastructures (ACIs) from the Console, the
edited ACIs are no longer deleted if one of them is invalid.
- The Console now supports passwords containing 8-bit characters.
- Attempting to change the Network Security Services (NSS) security database
password from the Console no longer displays an incorrect error message.
- Using the "nsslapd-allow-anonymous-access: rootdse" attribute no longer causes
the first administrator login to fail when anonymous bind access is restricted.
- The register-ds-admin.pl utility now supports registration to remote Directory
Servers.
- The Certificate Revocation List (CRL) / Compromised Key List (CKL) import
dialog now specifies the required file format, which is Privacy Enhanced Mail
(PEM), and informs that the file must exist in the server security directory.
- The RSA key size values are now 2048, 3072, and 4096. The default value,
previously 1024, is now 2048. The new signing algorithm values are SHA-1
(default), SHA-256, SHA-384, and SHA-512.
(BZ#1195503, BZ#1195505, BZ#1195508, BZ#1195511, BZ#1195512, BZ#1195513,
BZ#1195514, BZ#1195515, BZ#1195517, BZ#1195518, BZ#1195519, BZ#1195520)
This update fixes the following bugs:
- A bug in accessing the hardware security module (HSM) in the Admin Server
security CGI has been fixed, and it is now possible to configure nCipher HSMs
using the redhat-idm-console command. (BZ#622957)
- The configuration tab was not functional when the FIPS mode was enabled.
Information about the FIPS mode has been added to the Admin Server security CGI
to fix this bug, and FIPS mode is now supported. (BZ#951708)
- The remove-ds-admin.pl(8) man page did not include the description for the
"-a" option. Also, the description for "-a" displayed by the "remove-ds-admin.pl
- -help" command was not sufficient. This update adds the description for "-a" to
the man page and extends the "-a" description displayed by "remove-ds-admin.pl
- -help". (BZ#981573)
- Previously, the Directory Server used the SSL protocol version 3 (SSLv3).
SSLv3 is no longer considered secure, and the TLS protocol 1.1 (TLSv1.1) or
later should be used. With this update, the SSLv3 protocol is disabled by
default, and support for TLSv1.1 or later has been added to the Admin Server,
AdminUtil, and the Directory Server Console. (BZ#1172312)
Users of Red Hat Directory Server are advised to upgrade to these updated
packages, which fix these bugs and add these enhancements.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
To update all RPMs for your particular architecture, run:
rpm -Fvh [filenames]
where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.
Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
Affected Products
- Red Hat Directory Server 9 x86_64
- Red Hat Directory Server 9 i386
Fixes
- BZ - 1195503 - Rebase 389-ds-console to version RHDS9.1.1
- BZ - 1195505 - Rebase 389-admin-console to version RHDS9.1.1
- BZ - 1195508 - Rebase 389-admin to version RHDS9.1.1
- BZ - 1195511 - Rebase 389-adminutil to version RHDS9.1.1
- BZ - 1195512 - Rebase 389-console to version RHDS9.1.1
- BZ - 1195513 - Rebase redhat-ds-console to version RHDS9.1.1
- BZ - 1195514 - Rebase redhat-admin-console to version RHDS9.1.1
- BZ - 1195515 - Rebase redhat-ds-admin to version RHDS9.1.1
- BZ - 1195517 - Rebase idm-console-framework to version RHDS9.1.1
- BZ - 1195518 - Rebase redhat-ds to version RHDS9.1.1
- BZ - 1195519 - Rebase redhat-ds-base to version RHDS9.1.1
- BZ - 1195520 - Rebase redhat-idm-console to version RHDS9.1.1
CVEs
(none)
References
(none)
Red Hat Directory Server 9
SRPM | |
---|---|
389-admin-1.1.42-1.el6dsrv.src.rpm | SHA-256: 440e52169bd536e5a4d6be68c212049aeb78a9ffea44a9d456c7481d219368b7 |
389-admin-console-1.1.10-2.el6dsrv.src.rpm | SHA-256: d69d841766daedc5169215188d25a1217ff72e458a8706e06802df278d1983ec |
389-adminutil-1.1.22-1.el6dsrv.src.rpm | SHA-256: e99ac3c544dd3b361fd23dbf8dbef91b7b7888482a797e18a107372f9e24aedd |
389-console-1.1.10-1.el6dsrv.src.rpm | SHA-256: 83142681e8badd90ab1796a57881674f70de7a88eb3ea789c4c875166c2bd65c |
389-ds-console-1.2.12-1.el6dsrv.src.rpm | SHA-256: 633ec2f758c043df1d3f542f73181410286228e29e529e814587ac396b67c030 |
idm-console-framework-1.1.14-1.el6dsrv.src.rpm | SHA-256: 790956f945555b7bb7fc0ac8dabf9e0177de48e9c1df1398db5bcc8339caa473 |
redhat-admin-console-9.1.1-1.el6dsrv.src.rpm | SHA-256: d0f1918507bd5958ed8e52ed664c3b917b2bf45daf952345d04432ba8de02a1a |
redhat-ds-9.1.1-1.el6dsrv.src.rpm | SHA-256: 2254f8ce454da4fa617eadfe3f9e639e025080ef974a5daf96f69d8ebd8a65fe |
redhat-ds-admin-9.1.1-1.el6dsrv.src.rpm | SHA-256: 3f5d6207782b346aac1c71137421f9a816fd136075f29fcb90ae12bea7e93e39 |
redhat-ds-base-9.1.1-2.el6dsrv.src.rpm | SHA-256: 33750461a68fc73dbbd54135b690932115116ba2a58c9d9664fd2a24208ead9d |
redhat-ds-console-9.1.1-4.el6dsrv.src.rpm | SHA-256: 1bb83ef60fe3837662f403e10d505e0714a656162aed10cf2a7ff28e0fb393a8 |
redhat-idm-console-9.1.1-3.el6dsrv.src.rpm | SHA-256: aea01e30ca56c6e4c1557946c74418bdb2ab59c807cb6fc4d6399615271d7fac |
x86_64 | |
389-admin-1.1.42-1.el6dsrv.x86_64.rpm | SHA-256: c4a9f30635407498f3844da723750d98466684a91c46f1f392edd0ac8771138c |
389-admin-console-1.1.10-2.el6dsrv.noarch.rpm | SHA-256: e20550d1f9519d0ff05738bb2221da0fdf1accead0ea130be903d0dfdfc5a7a4 |
389-admin-console-doc-1.1.10-2.el6dsrv.noarch.rpm | SHA-256: 97484b2cc804911b4c4de3767bfcfa674c8bd25a314b47c88e062967fda54eae |
389-admin-debuginfo-1.1.42-1.el6dsrv.x86_64.rpm | SHA-256: 7373f6c4eb64b97fb9b0ba35469774865636b922db3dd21f1d41051a9c82dce7 |
389-adminutil-1.1.22-1.el6dsrv.x86_64.rpm | SHA-256: e1c36bf342739b54503c3ebcf9dd686f228d0d47dba42948d10677727ec2d0cf |
389-adminutil-debuginfo-1.1.22-1.el6dsrv.x86_64.rpm | SHA-256: 017b2a5e938d468c26e38da3e5addc0a18656ee3330dcb5750b838ce4aab36da |
389-adminutil-devel-1.1.22-1.el6dsrv.x86_64.rpm | SHA-256: 3e4c5882d21acd89500d85ceac9b49347ce4704e7d23acf91deae38bad4389aa |
389-console-1.1.10-1.el6dsrv.noarch.rpm | SHA-256: 84cd6ef72c733abe132aaf0bc31118c3d2a8ca0812a96f3020c9ddaa080bb245 |
389-ds-console-1.2.12-1.el6dsrv.noarch.rpm | SHA-256: 1b29839da6edcfd39dff199f269f9f20992fd25141610cd1068a69c4b227715e |
389-ds-console-doc-1.2.12-1.el6dsrv.noarch.rpm | SHA-256: 099dfba896834d4282ca07ef98e6ea35b098ece0d073689dae1aac3cdc7ed36e |
idm-console-framework-1.1.14-1.el6dsrv.noarch.rpm | SHA-256: 548ade8511bcca375a5d7eb81e9f4703b432a44ee64b3b0178e8771dc935dc85 |
redhat-admin-console-9.1.1-1.el6dsrv.noarch.rpm | SHA-256: 321bf894079c886c863c1f8cd5f59ef0864c98cf8ede80174a870d41b39c9876 |
redhat-admin-console-doc-9.1.1-1.el6dsrv.noarch.rpm | SHA-256: b7cab871cd434be9807ff72dc2438aa0578c63f110edcff9af9a782ee46afb9a |
redhat-ds-9.1.1-1.el6dsrv.x86_64.rpm | SHA-256: f657dc87b74ac9528c4fce928b89a7cc4b2b4fbe9d5cedce2a28dd3c3fcb728e |
redhat-ds-admin-9.1.1-1.el6dsrv.x86_64.rpm | SHA-256: 8e16383db479d88980e954e427a0f8bd491ce39da0d6fdba36b59d1fa8bb7587 |
redhat-ds-admin-debuginfo-9.1.1-1.el6dsrv.x86_64.rpm | SHA-256: 24f438c5ab42d7324198d7afa9e2c285f9adeaa92fea1f4e91b2e42eb47aa8bc |
redhat-ds-base-9.1.1-2.el6dsrv.x86_64.rpm | SHA-256: 12eb8dabfc3a32605708464c17c9de2cf1da2a772567ad088ee93209792dfd44 |
redhat-ds-base-debuginfo-9.1.1-2.el6dsrv.x86_64.rpm | SHA-256: c59064d684a7fc4f94445b95af9ea806cf50cebcd84072b3588c20209f9aee63 |
redhat-ds-base-devel-9.1.1-2.el6dsrv.x86_64.rpm | SHA-256: 5f8661da0fab83751930ba374417a6671e4eff59bcda2ed0e42105cb15d056bb |
redhat-ds-console-9.1.1-4.el6dsrv.noarch.rpm | SHA-256: 20108eb01e2f505076aa2a1557de30b731432e8fe6c593ec9a9b77a2bb362e34 |
redhat-ds-console-doc-9.1.1-4.el6dsrv.noarch.rpm | SHA-256: 7e140a63955408a70d3b94973186264b5506ee849c4fa8c0614f2b1aec02b249 |
redhat-idm-console-9.1.1-3.el6dsrv.x86_64.rpm | SHA-256: 81d07b29418ed98689ee97e2276408ee0f33a74c4a8d180799318c7ad884ce7b |
redhat-idm-console-debuginfo-9.1.1-3.el6dsrv.x86_64.rpm | SHA-256: 3480a3a37f9aa30609b59f2dceb23c3a8109337d289a8bd63da92f2d4dc53021 |
i386 | |
389-admin-1.1.42-1.el6dsrv.i386.rpm | SHA-256: ca854128c508d725ed494f1cc4d025e2c08a857cb38bad2fb638e9db6510c9fb |
389-admin-console-1.1.10-2.el6dsrv.noarch.rpm | SHA-256: e20550d1f9519d0ff05738bb2221da0fdf1accead0ea130be903d0dfdfc5a7a4 |
389-admin-console-doc-1.1.10-2.el6dsrv.noarch.rpm | SHA-256: 97484b2cc804911b4c4de3767bfcfa674c8bd25a314b47c88e062967fda54eae |
389-admin-debuginfo-1.1.42-1.el6dsrv.i386.rpm | SHA-256: a5076ffc6e9679b97eb2bf969ae85e72372bea3c72df98f59e2d783e4ee3c032 |
389-adminutil-1.1.22-1.el6dsrv.i386.rpm | SHA-256: a49efd7e9d8082f424de608c3cab95cabd6da68d398edc124346fbcffcd9945e |
389-adminutil-debuginfo-1.1.22-1.el6dsrv.i386.rpm | SHA-256: 0f9f46f5c99cfd27e2f91b79b0a657f1195b138889474fa5f860c6ea9c7fbc95 |
389-adminutil-devel-1.1.22-1.el6dsrv.i386.rpm | SHA-256: 3c807b3541bb91e685a204288b2b5757c603a1700018eb63d390c3bda35bbfbc |
389-console-1.1.10-1.el6dsrv.noarch.rpm | SHA-256: 84cd6ef72c733abe132aaf0bc31118c3d2a8ca0812a96f3020c9ddaa080bb245 |
389-ds-console-1.2.12-1.el6dsrv.noarch.rpm | SHA-256: 1b29839da6edcfd39dff199f269f9f20992fd25141610cd1068a69c4b227715e |
389-ds-console-doc-1.2.12-1.el6dsrv.noarch.rpm | SHA-256: 099dfba896834d4282ca07ef98e6ea35b098ece0d073689dae1aac3cdc7ed36e |
idm-console-framework-1.1.14-1.el6dsrv.noarch.rpm | SHA-256: 548ade8511bcca375a5d7eb81e9f4703b432a44ee64b3b0178e8771dc935dc85 |
redhat-admin-console-9.1.1-1.el6dsrv.noarch.rpm | SHA-256: 321bf894079c886c863c1f8cd5f59ef0864c98cf8ede80174a870d41b39c9876 |
redhat-admin-console-doc-9.1.1-1.el6dsrv.noarch.rpm | SHA-256: b7cab871cd434be9807ff72dc2438aa0578c63f110edcff9af9a782ee46afb9a |
redhat-ds-9.1.1-1.el6dsrv.i386.rpm | SHA-256: 362fe50f0ef620001d02481271bfe57ee464a9f6cd11f7314a4f44e18b52df77 |
redhat-ds-admin-9.1.1-1.el6dsrv.i386.rpm | SHA-256: 12773382ef7351abc7d7209639ff4477d8fe202e88001efbdb537739d10eb565 |
redhat-ds-admin-debuginfo-9.1.1-1.el6dsrv.i386.rpm | SHA-256: 195cb034833da3b6d6128443ece39986f9d37f51f3e3835005f2aab04b3e1542 |
redhat-ds-base-9.1.1-2.el6dsrv.i386.rpm | SHA-256: 675a3523570c071665eceedbe56375024a4af6ca31bd8ae971af844adafef838 |
redhat-ds-base-debuginfo-9.1.1-2.el6dsrv.i386.rpm | SHA-256: 615d215718414c33dff27d4ff71721bdc1732744a734d0fb7ab38f3fda0f0435 |
redhat-ds-base-devel-9.1.1-2.el6dsrv.i386.rpm | SHA-256: 9f84e8e8865a89c3cec6c99bf7e5bb5646ebdc7d5404de51a38231e767546363 |
redhat-ds-console-9.1.1-4.el6dsrv.noarch.rpm | SHA-256: 20108eb01e2f505076aa2a1557de30b731432e8fe6c593ec9a9b77a2bb362e34 |
redhat-ds-console-doc-9.1.1-4.el6dsrv.noarch.rpm | SHA-256: 7e140a63955408a70d3b94973186264b5506ee849c4fa8c0614f2b1aec02b249 |
redhat-idm-console-9.1.1-3.el6dsrv.i386.rpm | SHA-256: 05b45cfd2c1c2e1f08fc29c9b8dcce65b24d72bd410bf5ba5ca74bb45c426ba2 |
redhat-idm-console-debuginfo-9.1.1-3.el6dsrv.i386.rpm | SHA-256: 0ccf0571f3fac4a4d4bb562754cd25c4bab4ed4c80f61de13f98fdcc84b4e58a |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.