{"schema_version":"1.7.2","id":"OESA-2025-1120","modified":"2025-02-14T12:12:54Z","published":"2025-02-14T12:12:54Z","upstream":["CVE-2025-24898"],"summary":"three-eight-nine-ds-base security update","details":"389-ds-base is an LDAPv3 compliant server which includes the LDAP server and command line utilities for server administration.\r\n\r\nSecurity Fix(es):\n\nrust-openssl is a set of OpenSSL bindings for the Rust programming language. In affected versions `ssl::select_next_proto` can return a slice pointing into the `server` argument\u0026apos;s buffer but with a lifetime bound to the `client` argument. In situations where the `sever` buffer\u0026apos;s lifetime is shorter than the `client` buffer\u0026apos;s, this can cause a use after free. This could cause the server to crash or to return arbitrary memory contents to the client. The crate`openssl` version 0.10.70 fixes the signature of `ssl::select_next_proto` to properly constrain the output buffer\u0026apos;s lifetime to that of both input buffers. Users are advised to upgrade. In standard usage of `ssl::select_next_proto` in the callback passed to `SslContextBuilder::set_alpn_select_callback`, code is only affected if the `server` buffer is constructed *within* the callback.(CVE-2025-24898)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS","name":"three-eight-nine-ds-base","purl":"pkg:rpm/openEuler/three-eight-nine-ds-base\u0026distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"389-ds-base-3.1.1-5.oe2403"}]}],"ecosystem_specific":{"aarch64":["389-ds-base-3.1.1-5.oe2403.aarch64.rpm","389-ds-base-debuginfo-3.1.1-5.oe2403.aarch64.rpm","389-ds-base-debugsource-3.1.1-5.oe2403.aarch64.rpm","389-ds-base-devel-3.1.1-5.oe2403.aarch64.rpm","389-ds-base-help-3.1.1-5.oe2403.aarch64.rpm","389-ds-base-snmp-3.1.1-5.oe2403.aarch64.rpm"],"noarch":["cockpit-389-ds-3.1.1-5.oe2403.noarch.rpm","python3-lib389-3.1.1-5.oe2403.noarch.rpm"],"src":["389-ds-base-3.1.1-5.oe2403.src.rpm"],"x86_64":["389-ds-base-3.1.1-5.oe2403.x86_64.rpm","389-ds-base-debuginfo-3.1.1-5.oe2403.x86_64.rpm","389-ds-base-debugsource-3.1.1-5.oe2403.x86_64.rpm","389-ds-base-devel-3.1.1-5.oe2403.x86_64.rpm","389-ds-base-help-3.1.1-5.oe2403.x86_64.rpm","389-ds-base-snmp-3.1.1-5.oe2403.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1120"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-24898"}],"database_specific":{"severity":"Medium"}}