# Security update for 389-ds Announcement ID: SUSE-SU-2025:02896-1 Release Date: 2025-08-19T09:30:17Z Rating: low References: * bsc#1242666 * bsc#1243428 Cross-References: * CVE-2025-3416 CVSS scores: * CVE-2025-3416 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-3416 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-3416 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.4 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for 389-ds fixes the following issues: Update to version 2.0.20~git64.628a24b68: Security fixes: * CVE-2025-3416: Fixed openssl use after free (bsc#1242666) Other fixes: * resolve infinite loop due when loading RUV entryrdn (bsc#1243428) Upstream changelog: * Issue 6119 - Synchronise accept_thread with slapd_daemon (#6120) * Issue 6825 - RootDN Access Control Plugin with wildcards for IP addre… (#6826) * Issue 6819 - Incorrect pwdpolicysubentry returned for an entry with user password policy * Issue 6641 - modrdn fails when a user is member of multiple groups (#6643) * Issue 6534 - CI fails with Fedora 41 and DNF5 * Revert "Issue 5120 - ns-slapd doesn't start in referral mode (#6763)" * Issue 6438 - Add basic dsidm organizational unit tests * Issue 6439 - Fix dsidm service get_dn option * Issue 5120 - ns-slapd doesn't start in referral mode (#6763) * Issue 6740 Certificate verify fails in FIPS mode * Issue 5356 - Set DEFAULT_PASSWORD_STORAGE_SCHEME to PBKDF2-SHA512 in tests * Issue 6603 - Release tarballs ship a different Cargo.lock * Issue 4982 - BUG - missing inttypes.h (#4983) * Issue 6571 - (2nd) Nested group does not receive memberOf attribute (#6697) * Issue 6686 - CLI - Re-enabling user accounts that reached inactivity limit fails with error (#6687) * Issue 6288 - dsidm crash with account policy when alt-state-attr is disabled (#6292) * Issue 6571 - Nested group does not receive memberOf attribute (#6679) * Issue 6676 - Add GitHub workflow action and fix pbkdf2 tests (#6677) * Issue 6155 - ldap-agent fails to start because of permission error (#6179) * Issue 6632 - Replication init fails with ASAN build * Issue 6561 - TLS 1.2 stickiness in FIPS mode * Bump openssl from 0.10.66 to 0.10.70 in /src * Issue 6004 - (2nd) idletimeout may be ignored (#6569) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-2896=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libsvrcore0-debuginfo-2.0.20~git64.628a24b68-150400.3.45.3 * 389-ds-2.0.20~git64.628a24b68-150400.3.45.3 * 389-ds-debugsource-2.0.20~git64.628a24b68-150400.3.45.3 * libsvrcore0-2.0.20~git64.628a24b68-150400.3.45.3 * 389-ds-snmp-debuginfo-2.0.20~git64.628a24b68-150400.3.45.3 * lib389-2.0.20~git64.628a24b68-150400.3.45.3 * 389-ds-snmp-2.0.20~git64.628a24b68-150400.3.45.3 * 389-ds-debuginfo-2.0.20~git64.628a24b68-150400.3.45.3 * 389-ds-devel-2.0.20~git64.628a24b68-150400.3.45.3 ## References: * https://www.suse.com/security/cve/CVE-2025-3416.html * https://bugzilla.suse.com/show_bug.cgi?id=1242666 * https://bugzilla.suse.com/show_bug.cgi?id=1243428