SUSE-SU-2025:02896-1: low: Security update for 389-ds

SLE-UPDATES null at suse.de
Tue Aug 19 12:30:40 UTC 2025



# Security update for 389-ds

Announcement ID: SUSE-SU-2025:02896-1  
Release Date: 2025-08-19T09:30:17Z  
Rating: low  
References:

  * bsc#1242666
  * bsc#1243428

  
Cross-References:

  * CVE-2025-3416

  
CVSS scores:

  * CVE-2025-3416 ( SUSE ):  6.3
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-3416 ( SUSE ):  3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-3416 ( NVD ):  3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L

  
Affected Products:

  * openSUSE Leap 15.4

  
  
An update that solves one vulnerability and has one security fix can now be
installed.

## Description:

This update for 389-ds fixes the following issues:

Update to version 2.0.20~git64.628a24b68:

Security fixes:

  * CVE-2025-3416: Fixed openssl use after free (bsc#1242666)

Other fixes:

  * resolve infinite loop due when loading RUV entryrdn (bsc#1243428)

Upstream changelog: * Issue 6119 - Synchronise accept_thread with slapd_daemon
(#6120) * Issue 6825 - RootDN Access Control Plugin with wildcards for IP addre…
(#6826) * Issue 6819 - Incorrect pwdpolicysubentry returned for an entry with
user password policy * Issue 6641 - modrdn fails when a user is member of
multiple groups (#6643) * Issue 6534 - CI fails with Fedora 41 and DNF5 * Revert
"Issue 5120 - ns-slapd doesn't start in referral mode (#6763)" * Issue 6438 -
Add basic dsidm organizational unit tests * Issue 6439 - Fix dsidm service
get_dn option * Issue 5120 - ns-slapd doesn't start in referral mode (#6763) *
Issue 6740 Certificate verify fails in FIPS mode * Issue 5356 - Set
DEFAULT_PASSWORD_STORAGE_SCHEME to PBKDF2-SHA512 in tests * Issue 6603 - Release
tarballs ship a different Cargo.lock * Issue 4982 - BUG - missing inttypes.h
(#4983) * Issue 6571 - (2nd) Nested group does not receive memberOf attribute
(#6697) * Issue 6686 - CLI - Re-enabling user accounts that reached inactivity
limit fails with error (#6687) * Issue 6288 - dsidm crash with account policy
when alt-state-attr is disabled (#6292) * Issue 6571 - Nested group does not
receive memberOf attribute (#6679) * Issue 6676 - Add GitHub workflow action and
fix pbkdf2 tests (#6677) * Issue 6155 - ldap-agent fails to start because of
permission error (#6179) * Issue 6632 - Replication init fails with ASAN build *
Issue 6561 - TLS 1.2 stickiness in FIPS mode * Bump openssl from 0.10.66 to
0.10.70 in /src * Issue 6004 - (2nd) idletimeout may be ignored (#6569)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * openSUSE Leap 15.4  
    zypper in -t patch SUSE-2025-2896=1

## Package List:

  * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
    * libsvrcore0-debuginfo-2.0.20~git64.628a24b68-150400.3.45.3
    * 389-ds-2.0.20~git64.628a24b68-150400.3.45.3
    * 389-ds-debugsource-2.0.20~git64.628a24b68-150400.3.45.3
    * libsvrcore0-2.0.20~git64.628a24b68-150400.3.45.3
    * 389-ds-snmp-debuginfo-2.0.20~git64.628a24b68-150400.3.45.3
    * lib389-2.0.20~git64.628a24b68-150400.3.45.3
    * 389-ds-snmp-2.0.20~git64.628a24b68-150400.3.45.3
    * 389-ds-debuginfo-2.0.20~git64.628a24b68-150400.3.45.3
    * 389-ds-devel-2.0.20~git64.628a24b68-150400.3.45.3

## References:

  * https://www.suse.com/security/cve/CVE-2025-3416.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1242666
  * https://bugzilla.suse.com/show_bug.cgi?id=1243428

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20250819/2e222791/attachment.htm>


More information about the sle-updates mailing list