-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1322
                  389-ds:1.4 security and bug fix update
                               20 April 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           389-ds:1.4
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-35518  

Reference:         ESB-2021.1156
                   ESB-2021.0829
                   ESB-2021.0573

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2021:1258

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: 389-ds:1.4 security and bug fix update
Advisory ID:       RHSA-2021:1258-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:1258
Issue date:        2021-04-19
CVE Names:         CVE-2020-35518 
=====================================================================

1. Summary:

An update for the 389-ds:1.4 module is now available for Red Hat Enterprise
Linux 8.2 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream EUS (v. 8.2) - aarch64, noarch, ppc64le, s390x, x86_64

3. Description:

389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The
base packages include the Lightweight Directory Access Protocol (LDAP)
server and command-line utilities for server administration. 

Security Fix(es):

* 389-ds-base: information disclosure during the binding of a DN
(CVE-2020-35518)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* Replication now resolves entry conflicts during a modrdn operation
(BZ#1946631)

* Searches by an unauthorized client can no longer determine if an entry
exists or not by the result code (BZ#1946634)

Users of Red Hat Directory Server 11 are advised to install these updated
packages.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1905565 - CVE-2020-35518 389-ds-base: information disclosure during the binding of a DN
1946631 - Entries conflict not resolved by replication [rhel-8.2.0.z]
1946632 - CVE-2020-35518 389-ds:1.4/389-ds-base: information disclosure during the binding of a DN [rhel-8] [rhel-8.2.0.z]
1946634 - RHDS11: â\x{128}\x{156}writeâ\x{128}\x{157} permission of ACI changes ns-slapdâ\x{128}\x{153}s behavior on search operation [rhel-8.2.0.z]

6. Package List:

Red Hat Enterprise Linux AppStream EUS (v. 8.2):

Source:
389-ds-base-1.4.2.4-13.module+el8.2.0+10648+abe88955.src.rpm

aarch64:
389-ds-base-1.4.2.4-13.module+el8.2.0+10648+abe88955.aarch64.rpm
389-ds-base-debuginfo-1.4.2.4-13.module+el8.2.0+10648+abe88955.aarch64.rpm
389-ds-base-debugsource-1.4.2.4-13.module+el8.2.0+10648+abe88955.aarch64.rpm
389-ds-base-devel-1.4.2.4-13.module+el8.2.0+10648+abe88955.aarch64.rpm
389-ds-base-legacy-tools-1.4.2.4-13.module+el8.2.0+10648+abe88955.aarch64.rpm
389-ds-base-legacy-tools-debuginfo-1.4.2.4-13.module+el8.2.0+10648+abe88955.aarch64.rpm
389-ds-base-libs-1.4.2.4-13.module+el8.2.0+10648+abe88955.aarch64.rpm
389-ds-base-libs-debuginfo-1.4.2.4-13.module+el8.2.0+10648+abe88955.aarch64.rpm
389-ds-base-snmp-1.4.2.4-13.module+el8.2.0+10648+abe88955.aarch64.rpm
389-ds-base-snmp-debuginfo-1.4.2.4-13.module+el8.2.0+10648+abe88955.aarch64.rpm

noarch:
python3-lib389-1.4.2.4-13.module+el8.2.0+10648+abe88955.noarch.rpm

ppc64le:
389-ds-base-1.4.2.4-13.module+el8.2.0+10648+abe88955.ppc64le.rpm
389-ds-base-debuginfo-1.4.2.4-13.module+el8.2.0+10648+abe88955.ppc64le.rpm
389-ds-base-debugsource-1.4.2.4-13.module+el8.2.0+10648+abe88955.ppc64le.rpm
389-ds-base-devel-1.4.2.4-13.module+el8.2.0+10648+abe88955.ppc64le.rpm
389-ds-base-legacy-tools-1.4.2.4-13.module+el8.2.0+10648+abe88955.ppc64le.rpm
389-ds-base-legacy-tools-debuginfo-1.4.2.4-13.module+el8.2.0+10648+abe88955.ppc64le.rpm
389-ds-base-libs-1.4.2.4-13.module+el8.2.0+10648+abe88955.ppc64le.rpm
389-ds-base-libs-debuginfo-1.4.2.4-13.module+el8.2.0+10648+abe88955.ppc64le.rpm
389-ds-base-snmp-1.4.2.4-13.module+el8.2.0+10648+abe88955.ppc64le.rpm
389-ds-base-snmp-debuginfo-1.4.2.4-13.module+el8.2.0+10648+abe88955.ppc64le.rpm

s390x:
389-ds-base-1.4.2.4-13.module+el8.2.0+10648+abe88955.s390x.rpm
389-ds-base-debuginfo-1.4.2.4-13.module+el8.2.0+10648+abe88955.s390x.rpm
389-ds-base-debugsource-1.4.2.4-13.module+el8.2.0+10648+abe88955.s390x.rpm
389-ds-base-devel-1.4.2.4-13.module+el8.2.0+10648+abe88955.s390x.rpm
389-ds-base-legacy-tools-1.4.2.4-13.module+el8.2.0+10648+abe88955.s390x.rpm
389-ds-base-legacy-tools-debuginfo-1.4.2.4-13.module+el8.2.0+10648+abe88955.s390x.rpm
389-ds-base-libs-1.4.2.4-13.module+el8.2.0+10648+abe88955.s390x.rpm
389-ds-base-libs-debuginfo-1.4.2.4-13.module+el8.2.0+10648+abe88955.s390x.rpm
389-ds-base-snmp-1.4.2.4-13.module+el8.2.0+10648+abe88955.s390x.rpm
389-ds-base-snmp-debuginfo-1.4.2.4-13.module+el8.2.0+10648+abe88955.s390x.rpm

x86_64:
389-ds-base-1.4.2.4-13.module+el8.2.0+10648+abe88955.x86_64.rpm
389-ds-base-debuginfo-1.4.2.4-13.module+el8.2.0+10648+abe88955.x86_64.rpm
389-ds-base-debugsource-1.4.2.4-13.module+el8.2.0+10648+abe88955.x86_64.rpm
389-ds-base-devel-1.4.2.4-13.module+el8.2.0+10648+abe88955.x86_64.rpm
389-ds-base-legacy-tools-1.4.2.4-13.module+el8.2.0+10648+abe88955.x86_64.rpm
389-ds-base-legacy-tools-debuginfo-1.4.2.4-13.module+el8.2.0+10648+abe88955.x86_64.rpm
389-ds-base-libs-1.4.2.4-13.module+el8.2.0+10648+abe88955.x86_64.rpm
389-ds-base-libs-debuginfo-1.4.2.4-13.module+el8.2.0+10648+abe88955.x86_64.rpm
389-ds-base-snmp-1.4.2.4-13.module+el8.2.0+10648+abe88955.x86_64.rpm
389-ds-base-snmp-debuginfo-1.4.2.4-13.module+el8.2.0+10648+abe88955.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-35518
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=/F0i
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=jx/K
-----END PGP SIGNATURE-----