Red Hat Directory Server 8 and 389 Directory Server, when debugging is enabled, allows remote attackers to obtain sensitive replicated metadata by searching the directory.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_name": "389-ds", "binary_version": "1.3.4.9-1" }, { "binary_name": "389-ds-base", "binary_version": "1.3.4.9-1" }, { "binary_name": "389-ds-base-dbg", "binary_version": "1.3.4.9-1" }, { "binary_name": "389-ds-base-dbgsym", "binary_version": "1.3.4.9-1" }, { "binary_name": "389-ds-base-dev", "binary_version": "1.3.4.9-1" }, { "binary_name": "389-ds-base-libs", "binary_version": "1.3.4.9-1" }, { "binary_name": "389-ds-base-libs-dbg", "binary_version": "1.3.4.9-1" }, { "binary_name": "389-ds-base-libs-dbgsym", "binary_version": "1.3.4.9-1" } ] }