<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for three-eight-nine-ds-base is now available for openEuler-22.03-LTS-SP3</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2024-2168</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2024-09-20</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2024-09-20</InitialReleaseDate>
		<CurrentReleaseDate>2024-09-20</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2024-09-20</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">three-eight-nine-ds-base security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for three-eight-nine-ds-base is now available for openEuler-22.03-LTS-SP3</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">389-ds-base is an LDAPv3 compliant server which includes the LDAP server and command line utilities for server administration.

Security Fix(es):

An access control bypass vulnerability found in 389-ds-base. That mishandling of the filter that would yield incorrect results, but as that has progressed, can be determined that it actually is an access control bypass. This may allow any remote unauthenticated user to issue a filter that allows searching for database items they do not have access to, including but not limited to potentially userPassword hashes and other sensitive data.(CVE-2022-1949)

A denial of service vulnerability was found in the 389-ds-base LDAP server. This issue may allow an authenticated user to cause a server denial of service while attempting to log in with a user with a malformed hash in their password.(CVE-2024-5953)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for three-eight-nine-ds-base is now available for openEuler-22.03-LTS-SP3.

openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">three-eight-nine-ds-base</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2168</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2022-1949</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-5953</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2022-1949</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-5953</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-22.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">openEuler-22.03-LTS-SP3</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="389-ds-base-1.4.3.36-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">389-ds-base-1.4.3.36-7.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="389-ds-base-debuginfo-1.4.3.36-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">389-ds-base-debuginfo-1.4.3.36-7.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="389-ds-base-debugsource-1.4.3.36-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">389-ds-base-debugsource-1.4.3.36-7.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="389-ds-base-devel-1.4.3.36-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">389-ds-base-devel-1.4.3.36-7.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="389-ds-base-help-1.4.3.36-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">389-ds-base-help-1.4.3.36-7.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="389-ds-base-legacy-tools-1.4.3.36-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">389-ds-base-legacy-tools-1.4.3.36-7.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="389-ds-base-snmp-1.4.3.36-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">389-ds-base-snmp-1.4.3.36-7.oe2203sp3.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="389-ds-base-1.4.3.36-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">389-ds-base-1.4.3.36-7.oe2203sp3.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="389-ds-base-1.4.3.36-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">389-ds-base-1.4.3.36-7.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="389-ds-base-debuginfo-1.4.3.36-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">389-ds-base-debuginfo-1.4.3.36-7.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="389-ds-base-debugsource-1.4.3.36-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">389-ds-base-debugsource-1.4.3.36-7.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="389-ds-base-devel-1.4.3.36-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">389-ds-base-devel-1.4.3.36-7.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="389-ds-base-help-1.4.3.36-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">389-ds-base-help-1.4.3.36-7.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="389-ds-base-legacy-tools-1.4.3.36-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">389-ds-base-legacy-tools-1.4.3.36-7.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="389-ds-base-snmp-1.4.3.36-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">389-ds-base-snmp-1.4.3.36-7.oe2203sp3.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="cockpit-389-ds-1.4.3.36-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">cockpit-389-ds-1.4.3.36-7.oe2203sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="python3-lib389-1.4.3.36-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">python3-lib389-1.4.3.36-7.oe2203sp3.noarch.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An access control bypass vulnerability found in 389-ds-base. That mishandling of the filter that would yield incorrect results, but as that has progressed, can be determined that it actually is an access control bypass. This may allow any remote unauthenticated user to issue a filter that allows searching for database items they do not have access to, including but not limited to potentially userPassword hashes and other sensitive data.</Note>
		</Notes>
		<ReleaseDate>2024-09-20</ReleaseDate>
		<CVE>CVE-2022-1949</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>three-eight-nine-ds-base security update</Description>
				<DATE>2024-09-20</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2168</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A denial of service vulnerability was found in the 389-ds-base LDAP server. This issue may allow an authenticated user to cause a server denial of service while attempting to log in with a user with a malformed hash in their password.</Note>
		</Notes>
		<ReleaseDate>2024-09-20</ReleaseDate>
		<CVE>CVE-2024-5953</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.7</BaseScore>
				<Vector>AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>three-eight-nine-ds-base security update</Description>
				<DATE>2024-09-20</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2168</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>