Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.854947
Category:SuSE Local Security Checks
Title:openSUSE: Security Advisory for 389-ds (SUSE-SU-2022:3029-1)
Summary:The remote host is missing an update for the '389-ds'; package(s) announced via the SUSE-SU-2022:3029-1 advisory.
Description:Summary:
The remote host is missing an update for the '389-ds'
package(s) announced via the SUSE-SU-2022:3029-1 advisory.

Vulnerability Insight:
This update for 389-ds fixes the following issues:

- CVE-2022-2850: Fixed an application crash when running a sync_repl
client that could be triggered via a malformed cookie (bsc#1202470).
Non-security fixes:

- Update to version 1.4.4.19~
git46.c900a28c8:

* CI - makes replication/acceptance_test.py::test_modify_entry more
robust

* UI - LDAP Editor is not updated when we switch instances

- Improvements to openldap import with password policy present
(bsc#1199908)

- Update to version 1.4.4.19~
git43.8ba2ea21f:

* fix covscan

* BUG - pid file handling

* Memory leak in slapi_ldap_get_lderrno

* Need a compatibility option about sub suffix handling

* Release tarballs don't contain cockpit webapp

* Replication broken after password change

* Harden ReplicationManager.wait_for_replication

* dscontainer: TypeError: unsupported operand type(s) for /: 'str' and
'int'

* CLI - dsconf backend export breaks with multiple backends

* CLI - improve task handling

Affected Software/OS:
'389-ds' package(s) on openSUSE Leap 15.3.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:L/Au:S/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2022-2850
https://access.redhat.com/security/cve/CVE-2022-2850
https://bugzilla.redhat.com/show_bug.cgi?id=2118691
https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html
CopyrightCopyright (C) 2022 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.