{"affected":[{"ecosystem_specific":{"binaries":[{"389-ds":"1.4.4.20~git3.e7ac6d87-150300.3.35.1","389-ds-devel":"1.4.4.20~git3.e7ac6d87-150300.3.35.1","lib389":"1.4.4.20~git3.e7ac6d87-150300.3.35.1","libsvrcore0":"1.4.4.20~git3.e7ac6d87-150300.3.35.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP3-LTSS","name":"389-ds","purl":"pkg:rpm/suse/389-ds&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.4.4.20~git3.e7ac6d87-150300.3.35.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"389-ds":"1.4.4.20~git3.e7ac6d87-150300.3.35.1","389-ds-devel":"1.4.4.20~git3.e7ac6d87-150300.3.35.1","lib389":"1.4.4.20~git3.e7ac6d87-150300.3.35.1","libsvrcore0":"1.4.4.20~git3.e7ac6d87-150300.3.35.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP3-LTSS","name":"389-ds","purl":"pkg:rpm/suse/389-ds&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.4.4.20~git3.e7ac6d87-150300.3.35.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"389-ds":"1.4.4.20~git3.e7ac6d87-150300.3.35.1","389-ds-devel":"1.4.4.20~git3.e7ac6d87-150300.3.35.1","lib389":"1.4.4.20~git3.e7ac6d87-150300.3.35.1","libsvrcore0":"1.4.4.20~git3.e7ac6d87-150300.3.35.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP3","name":"389-ds","purl":"pkg:rpm/suse/389-ds&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.4.4.20~git3.e7ac6d87-150300.3.35.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"389-ds":"1.4.4.20~git3.e7ac6d87-150300.3.35.1","389-ds-devel":"1.4.4.20~git3.e7ac6d87-150300.3.35.1","lib389":"1.4.4.20~git3.e7ac6d87-150300.3.35.1","libsvrcore0":"1.4.4.20~git3.e7ac6d87-150300.3.35.1"}]},"package":{"ecosystem":"SUSE:Enterprise Storage 7.1","name":"389-ds","purl":"pkg:rpm/suse/389-ds&distro=SUSE%20Enterprise%20Storage%207.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.4.4.20~git3.e7ac6d87-150300.3.35.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for 389-ds fixes the following issues:\n\n- Update to version 1.4.4.20~git3.e7ac6d87:\n- CVE-2024-3657: DOS via via specially crafted kerberos AS-REQ request. (bsc#1225512)\n- CVE-2024-5953: Malformed userPassword hashes may cause a denial of service. (bsc#1226277)\n- CVE-2024-2199: Malformed userPassword may cause crash at do_modify in slapd/modify.c. (bsc#1225507)\n","id":"SUSE-SU-2024:3257-1","modified":"2024-09-16T12:39:40Z","published":"2024-09-16T12:39:40Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243257-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225507"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225512"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226277"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-2199"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-3657"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-5953"}],"related":["CVE-2024-2199","CVE-2024-3657","CVE-2024-5953"],"summary":"Security update for 389-ds","upstream":["CVE-2024-2199","CVE-2024-3657","CVE-2024-5953"]}