<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2024-0263</id>
    <title>An update for 389-ds-base is now available for HCE 2.0</title>
    <severity>Important</severity>
    <release>HCE 2.0</release>
    <issued date="2024-11-19 07:40:47"/>
    <updated date="2024-11-19 07:40:47"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-3657" id="CVE-2024-3657" title="CVE-2024-3657 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-2199" id="CVE-2024-2199" title="CVE-2024-2199 Base Score: 5.7 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1949" id="CVE-2022-1949" title="CVE-2022-1949 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-5953" id="CVE-2024-5953" title="CVE-2024-5953 Base Score: 5.7 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

A flaw was found in 389-ds-base. A specially-crafted LDAP query can potentially cause a failure on the directory server, leading to a denial of service (CVE-2024-3657)

A denial of service vulnerability was found in 389-ds-base ldap server. This issue may allow an authenticated user to cause a server crash while modifying `userPassword` using malformed input. (CVE-2024-2199)

An access control bypass vulnerability found in 389-ds-base. That mishandling of the filter that would yield incorrect results, but as that has progressed, can be determined that it actually is an access control bypass. This may allow any remote unauthenticated user to issue a filter that allows searching for database items they do not have access to, including but not limited to potentially userPassword hashes and other sensitive data. (CVE-2022-1949)

A denial of service vulnerability was found in the 389-ds-base LDAP server. This issue may allow an authenticated user to cause a server denial of service while attempting to log in with a user with a malformed hash in their password. (CVE-2024-5953)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="389-ds-base">
        <name>HCE 2.0</name>
        <package arch="aarch64" name="389-ds-base" version="1.4.3.36" release="5.r2.hce2">
          <filename>389-ds-base-1.4.3.36-5.r2.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="389-ds-base-devel" version="1.4.3.36" release="5.r2.hce2">
          <filename>389-ds-base-devel-1.4.3.36-5.r2.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="389-ds-base-help" version="1.4.3.36" release="5.r2.hce2">
          <filename>389-ds-base-help-1.4.3.36-5.r2.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="389-ds-base-legacy-tools" version="1.4.3.36" release="5.r2.hce2">
          <filename>389-ds-base-legacy-tools-1.4.3.36-5.r2.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="389-ds-base-snmp" version="1.4.3.36" release="5.r2.hce2">
          <filename>389-ds-base-snmp-1.4.3.36-5.r2.hce2.aarch64.rpm</filename>
        </package>
        <package arch="noarch" name="python3-lib389" version="1.4.3.36" release="5.r2.hce2">
          <filename>python3-lib389-1.4.3.36-5.r2.hce2.noarch.rpm</filename>
        </package>
        <package arch="x86_64" name="389-ds-base" version="1.4.3.36" release="5.r2.hce2">
          <filename>389-ds-base-1.4.3.36-5.r2.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="389-ds-base-devel" version="1.4.3.36" release="5.r2.hce2">
          <filename>389-ds-base-devel-1.4.3.36-5.r2.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="389-ds-base-help" version="1.4.3.36" release="5.r2.hce2">
          <filename>389-ds-base-help-1.4.3.36-5.r2.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="389-ds-base-legacy-tools" version="1.4.3.36" release="5.r2.hce2">
          <filename>389-ds-base-legacy-tools-1.4.3.36-5.r2.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="389-ds-base-snmp" version="1.4.3.36" release="5.r2.hce2">
          <filename>389-ds-base-snmp-1.4.3.36-5.r2.hce2.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
