SUSE-SU-2025:02896-1: low: Security update for 389-ds
SLE-UPDATES
null at suse.de
Tue Aug 19 12:30:40 UTC 2025
# Security update for 389-ds
Announcement ID: SUSE-SU-2025:02896-1
Release Date: 2025-08-19T09:30:17Z
Rating: low
References:
* bsc#1242666
* bsc#1243428
Cross-References:
* CVE-2025-3416
CVSS scores:
* CVE-2025-3416 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-3416 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-3416 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* openSUSE Leap 15.4
An update that solves one vulnerability and has one security fix can now be
installed.
## Description:
This update for 389-ds fixes the following issues:
Update to version 2.0.20~git64.628a24b68:
Security fixes:
* CVE-2025-3416: Fixed openssl use after free (bsc#1242666)
Other fixes:
* resolve infinite loop due when loading RUV entryrdn (bsc#1243428)
Upstream changelog: * Issue 6119 - Synchronise accept_thread with slapd_daemon
(#6120) * Issue 6825 - RootDN Access Control Plugin with wildcards for IP addre…
(#6826) * Issue 6819 - Incorrect pwdpolicysubentry returned for an entry with
user password policy * Issue 6641 - modrdn fails when a user is member of
multiple groups (#6643) * Issue 6534 - CI fails with Fedora 41 and DNF5 * Revert
"Issue 5120 - ns-slapd doesn't start in referral mode (#6763)" * Issue 6438 -
Add basic dsidm organizational unit tests * Issue 6439 - Fix dsidm service
get_dn option * Issue 5120 - ns-slapd doesn't start in referral mode (#6763) *
Issue 6740 Certificate verify fails in FIPS mode * Issue 5356 - Set
DEFAULT_PASSWORD_STORAGE_SCHEME to PBKDF2-SHA512 in tests * Issue 6603 - Release
tarballs ship a different Cargo.lock * Issue 4982 - BUG - missing inttypes.h
(#4983) * Issue 6571 - (2nd) Nested group does not receive memberOf attribute
(#6697) * Issue 6686 - CLI - Re-enabling user accounts that reached inactivity
limit fails with error (#6687) * Issue 6288 - dsidm crash with account policy
when alt-state-attr is disabled (#6292) * Issue 6571 - Nested group does not
receive memberOf attribute (#6679) * Issue 6676 - Add GitHub workflow action and
fix pbkdf2 tests (#6677) * Issue 6155 - ldap-agent fails to start because of
permission error (#6179) * Issue 6632 - Replication init fails with ASAN build *
Issue 6561 - TLS 1.2 stickiness in FIPS mode * Bump openssl from 0.10.66 to
0.10.70 in /src * Issue 6004 - (2nd) idletimeout may be ignored (#6569)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-2896=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* libsvrcore0-debuginfo-2.0.20~git64.628a24b68-150400.3.45.3
* 389-ds-2.0.20~git64.628a24b68-150400.3.45.3
* 389-ds-debugsource-2.0.20~git64.628a24b68-150400.3.45.3
* libsvrcore0-2.0.20~git64.628a24b68-150400.3.45.3
* 389-ds-snmp-debuginfo-2.0.20~git64.628a24b68-150400.3.45.3
* lib389-2.0.20~git64.628a24b68-150400.3.45.3
* 389-ds-snmp-2.0.20~git64.628a24b68-150400.3.45.3
* 389-ds-debuginfo-2.0.20~git64.628a24b68-150400.3.45.3
* 389-ds-devel-2.0.20~git64.628a24b68-150400.3.45.3
## References:
* https://www.suse.com/security/cve/CVE-2025-3416.html
* https://bugzilla.suse.com/show_bug.cgi?id=1242666
* https://bugzilla.suse.com/show_bug.cgi?id=1243428
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20250819/2e222791/attachment.htm>
More information about the sle-updates
mailing list