<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">Security update for 389-ds</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2022:2295-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2022-07-06T11:34:50Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2022-07-06T11:34:50Z</InitialReleaseDate>
    <CurrentReleaseDate>2022-07-06T11:34:50Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for 389-ds</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for 389-ds fixes the following issues:

- CVE-2021-4091: Fixed double free in psearch (bsc#1195324).    
- CVE-2022-1949: Fixed full access control bypass with simple crafted query (bsc#1199889).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container suse/389-ds:latest-2022-2295,SUSE-2022-2295,SUSE-SLE-Module-Server-Applications-15-SP4-2022-2295,openSUSE-SLE-15.4-2022-2295</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20222295-1/</URL>
      <Description>Link for SUSE-SU-2022:2295-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2022-July/011430.html</URL>
      <Description>E-Mail link for SUSE-SU-2022:2295-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1195324</URL>
      <Description>SUSE Bug 1195324</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1199889</URL>
      <Description>SUSE Bug 1199889</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-4091/</URL>
      <Description>SUSE CVE CVE-2021-4091 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1949/</URL>
      <Description>SUSE CVE CVE-2022-1949 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="Container suse/389-ds:latest">
      <Branch Type="Product Name" Name="Container suse/389-ds:latest">
        <FullProductName ProductID="Container suse/389-ds:latest">Container suse/389-ds:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Server Applications 15 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Server Applications 15 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP4" CPE="cpe:/o:suse:sle-module-server-applications:15:sp4">SUSE Linux Enterprise Module for Server Applications 15 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.4">
      <Branch Type="Product Name" Name="openSUSE Leap 15.4">
        <FullProductName ProductID="openSUSE Leap 15.4" CPE="cpe:/o:opensuse:leap:15.4">openSUSE Leap 15.4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="389-ds-2.0.15~git26.1ea6a6803-150400.3.5.1">
      <FullProductName ProductID="389-ds-2.0.15~git26.1ea6a6803-150400.3.5.1">389-ds-2.0.15~git26.1ea6a6803-150400.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="lib389-2.0.15~git26.1ea6a6803-150400.3.5.1">
      <FullProductName ProductID="lib389-2.0.15~git26.1ea6a6803-150400.3.5.1">lib389-2.0.15~git26.1ea6a6803-150400.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsvrcore0-2.0.15~git26.1ea6a6803-150400.3.5.1">
      <FullProductName ProductID="libsvrcore0-2.0.15~git26.1ea6a6803-150400.3.5.1">libsvrcore0-2.0.15~git26.1ea6a6803-150400.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="389-ds-devel-2.0.15~git26.1ea6a6803-150400.3.5.1">
      <FullProductName ProductID="389-ds-devel-2.0.15~git26.1ea6a6803-150400.3.5.1">389-ds-devel-2.0.15~git26.1ea6a6803-150400.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="389-ds-snmp-2.0.15~git26.1ea6a6803-150400.3.5.1">
      <FullProductName ProductID="389-ds-snmp-2.0.15~git26.1ea6a6803-150400.3.5.1">389-ds-snmp-2.0.15~git26.1ea6a6803-150400.3.5.1</FullProductName>
    </Branch>
    <Relationship ProductReference="389-ds-2.0.15~git26.1ea6a6803-150400.3.5.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/389-ds:latest">
      <FullProductName ProductID="Container suse/389-ds:latest:389-ds-2.0.15~git26.1ea6a6803-150400.3.5.1">389-ds-2.0.15~git26.1ea6a6803-150400.3.5.1 as a component of Container suse/389-ds:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="lib389-2.0.15~git26.1ea6a6803-150400.3.5.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/389-ds:latest">
      <FullProductName ProductID="Container suse/389-ds:latest:lib389-2.0.15~git26.1ea6a6803-150400.3.5.1">lib389-2.0.15~git26.1ea6a6803-150400.3.5.1 as a component of Container suse/389-ds:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsvrcore0-2.0.15~git26.1ea6a6803-150400.3.5.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/389-ds:latest">
      <FullProductName ProductID="Container suse/389-ds:latest:libsvrcore0-2.0.15~git26.1ea6a6803-150400.3.5.1">libsvrcore0-2.0.15~git26.1ea6a6803-150400.3.5.1 as a component of Container suse/389-ds:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="389-ds-2.0.15~git26.1ea6a6803-150400.3.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP4:389-ds-2.0.15~git26.1ea6a6803-150400.3.5.1">389-ds-2.0.15~git26.1ea6a6803-150400.3.5.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="389-ds-devel-2.0.15~git26.1ea6a6803-150400.3.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP4:389-ds-devel-2.0.15~git26.1ea6a6803-150400.3.5.1">389-ds-devel-2.0.15~git26.1ea6a6803-150400.3.5.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="lib389-2.0.15~git26.1ea6a6803-150400.3.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP4:lib389-2.0.15~git26.1ea6a6803-150400.3.5.1">lib389-2.0.15~git26.1ea6a6803-150400.3.5.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsvrcore0-2.0.15~git26.1ea6a6803-150400.3.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP4:libsvrcore0-2.0.15~git26.1ea6a6803-150400.3.5.1">libsvrcore0-2.0.15~git26.1ea6a6803-150400.3.5.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="389-ds-2.0.15~git26.1ea6a6803-150400.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:389-ds-2.0.15~git26.1ea6a6803-150400.3.5.1">389-ds-2.0.15~git26.1ea6a6803-150400.3.5.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="389-ds-devel-2.0.15~git26.1ea6a6803-150400.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:389-ds-devel-2.0.15~git26.1ea6a6803-150400.3.5.1">389-ds-devel-2.0.15~git26.1ea6a6803-150400.3.5.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="389-ds-snmp-2.0.15~git26.1ea6a6803-150400.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:389-ds-snmp-2.0.15~git26.1ea6a6803-150400.3.5.1">389-ds-snmp-2.0.15~git26.1ea6a6803-150400.3.5.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="lib389-2.0.15~git26.1ea6a6803-150400.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:lib389-2.0.15~git26.1ea6a6803-150400.3.5.1">lib389-2.0.15~git26.1ea6a6803-150400.3.5.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsvrcore0-2.0.15~git26.1ea6a6803-150400.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:libsvrcore0-2.0.15~git26.1ea6a6803-150400.3.5.1">libsvrcore0-2.0.15~git26.1ea6a6803-150400.3.5.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
  </ProductTree>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A double-free was found in the way 389-ds-base handles virtual attributes context in persistent searches. An attacker could send a series of search requests, forcing the server to behave unexpectedly, and crash.</Note>
    </Notes>
    <CVE>CVE-2021-4091</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/389-ds:latest:389-ds-2.0.15~git26.1ea6a6803-150400.3.5.1</ProductID>
        <ProductID>Container suse/389-ds:latest:lib389-2.0.15~git26.1ea6a6803-150400.3.5.1</ProductID>
        <ProductID>Container suse/389-ds:latest:libsvrcore0-2.0.15~git26.1ea6a6803-150400.3.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP4:389-ds-2.0.15~git26.1ea6a6803-150400.3.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP4:389-ds-devel-2.0.15~git26.1ea6a6803-150400.3.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP4:lib389-2.0.15~git26.1ea6a6803-150400.3.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP4:libsvrcore0-2.0.15~git26.1ea6a6803-150400.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.4:389-ds-2.0.15~git26.1ea6a6803-150400.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.4:389-ds-devel-2.0.15~git26.1ea6a6803-150400.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.4:389-ds-snmp-2.0.15~git26.1ea6a6803-150400.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.4:lib389-2.0.15~git26.1ea6a6803-150400.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.4:libsvrcore0-2.0.15~git26.1ea6a6803-150400.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>5</BaseScoreV2>
        <VectorV2>AV:N/AC:L/Au:N/C:N/I:N/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>5.9</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20222295-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-4091.html</URL>
        <Description>CVE-2021-4091</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195324</URL>
        <Description>SUSE Bug 1195324</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An access control bypass vulnerability found in 389-ds-base. That mishandling of the filter that would yield incorrect results, but as that has progressed, can be determined that it actually is an access control bypass. This may allow any remote unauthenticated user to issue a filter that allows searching for database items they do not have access to, including but not limited to potentially userPassword hashes and other sensitive data.</Note>
    </Notes>
    <CVE>CVE-2022-1949</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/389-ds:latest:389-ds-2.0.15~git26.1ea6a6803-150400.3.5.1</ProductID>
        <ProductID>Container suse/389-ds:latest:lib389-2.0.15~git26.1ea6a6803-150400.3.5.1</ProductID>
        <ProductID>Container suse/389-ds:latest:libsvrcore0-2.0.15~git26.1ea6a6803-150400.3.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP4:389-ds-2.0.15~git26.1ea6a6803-150400.3.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP4:389-ds-devel-2.0.15~git26.1ea6a6803-150400.3.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP4:lib389-2.0.15~git26.1ea6a6803-150400.3.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP4:libsvrcore0-2.0.15~git26.1ea6a6803-150400.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.4:389-ds-2.0.15~git26.1ea6a6803-150400.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.4:389-ds-devel-2.0.15~git26.1ea6a6803-150400.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.4:389-ds-snmp-2.0.15~git26.1ea6a6803-150400.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.4:lib389-2.0.15~git26.1ea6a6803-150400.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.4:libsvrcore0-2.0.15~git26.1ea6a6803-150400.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>5</BaseScoreV2>
        <VectorV2>AV:N/AC:L/Au:N/C:P/I:N/A:N</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>9.1</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20222295-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1949.html</URL>
        <Description>CVE-2022-1949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199889</URL>
        <Description>SUSE Bug 1199889</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
</cvrfdoc>
