SUSE SLES15 Security Update : 389-ds (SUSE-SU-2021:1878-1)

2021-06-09T00:00:00
ID SUSE_SU-2021-1878-1.NASL
Type nessus
Reporter This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.
Modified 2021-06-09T00:00:00

Description

This update for 389-ds fixes the following issues :

CVE-2021-3514: Fixed a sync_repl NULL pointer dereference in sync_create_state_control() (bsc#1185356)

389-ds was updated to version 1.4.3.23~git0.f53d0132b :

Bump version to 1.4.3.23 :

Issue 4725 - [RFE] DS - Update the password policy to support a Temporary Password Rules (#4727)

Issue 4759 - Fix coverity issue (#4760)

Issue 4656 - Fix cherry pick error around replication enabling

Issue 4701 - RFE - Exclude attributes from retro changelog (#4723) (#4746)

Issue 4742 - UI - should always use LDAPI path when calling CLI

Issue 4667 - incorrect accounting of readers in vattr rwlock (#4732)

Issue 4711 - SIGSEV with sync_repl (#4738)

Issue 4649 - fix testcase importing ContentSyncPlugin

Issue 2736 - Warnings from automatic shebang munging macro

Issue 2736 - https://github.com/389ds/389-ds-base/issues/2736

Issue 4706 - negative wtime in access log for CMP operations

Bump version to 1.4.3.22 :

Issue 4671 - UI - Fix browser crashes

lib389 - Add ContentSyncPlugin class

Issue 4656 - lib389 - fix cherry pick error

Issue 4229 - Fix Rust linking

Issue 4658 - monitor - connection start date is incorrect

Issue 2621 - lib389 - backport ds_supports_new_changelog()

Issue 4656 - Make replication CLI backwards compatible with role name change

Issue 4656 - Remove problematic language from UI/CLI/lib389

Issue 4459 - lib389 - Default paths should use dse.ldif if the server is down

Issue 4663 - CLI - unable to add objectclass/attribute without x-origin

Bump version to 1.4.3.21 :

Issue 4169 - UI - updates on the tuning page are not reflected in the UI

Issue 4588 - BUG - unable to compile without xcrypt (#4589)

Issue 4513 - Fix replication CI test failures (#4557)

Issue 4646 - CLI/UI - revise DNA plugin management

Issue 4644 - Large updates can reset the CLcache to the beginning of the changelog (#4647)

Issue 4649 - crash in sync_repl when a MODRDN create a cenotaph (#4652)

Issue 4615 - log message when psearch first exceeds max threads per conn

Bump version to 1.4.3.20 :

Issue 4324 - Some architectures the cache line size file does not exist

Issue 4593 - RFE - Print help when nsSSLPersonalitySSL is not found (#4614)

Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

                                        
                                            #%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from SUSE update advisory SUSE-SU-2021:1878-1.
# The text itself is copyright (C) SUSE.
#

include('deprecated_nasl_level.inc');
include("compat.inc");

if (description)
{
  script_id(150400);
  script_version("1.1");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/06/09");

  script_cve_id("CVE-2021-3514");

  script_name(english:"SUSE SLES15 Security Update : 389-ds (SUSE-SU-2021:1878-1)");
  script_summary(english:"Checks rpm output for the updated packages.");

  script_set_attribute(
    attribute:"synopsis",
    value:"The remote SUSE host is missing one or more security updates."
  );
  script_set_attribute(
    attribute:"description",
    value:
"This update for 389-ds fixes the following issues :

CVE-2021-3514: Fixed a sync_repl NULL pointer dereference in
sync_create_state_control() (bsc#1185356)

389-ds was updated to version 1.4.3.23~git0.f53d0132b :

Bump version to 1.4.3.23 :

Issue 4725 - [RFE] DS - Update the password policy to support a
Temporary Password Rules (#4727)

Issue 4759 - Fix coverity issue (#4760)

Issue 4656 - Fix cherry pick error around replication enabling

Issue 4701 - RFE - Exclude attributes from retro changelog (#4723)
(#4746)

Issue 4742 - UI - should always use LDAPI path when calling CLI

Issue 4667 - incorrect accounting of readers in vattr rwlock (#4732)

Issue 4711 - SIGSEV with sync_repl (#4738)

Issue 4649 - fix testcase importing ContentSyncPlugin

Issue 2736 - Warnings from automatic shebang munging macro

Issue 2736 - https://github.com/389ds/389-ds-base/issues/2736

Issue 4706 - negative wtime in access log for CMP operations

Bump version to 1.4.3.22 :

Issue 4671 - UI - Fix browser crashes

lib389 - Add ContentSyncPlugin class

Issue 4656 - lib389 - fix cherry pick error

Issue 4229 - Fix Rust linking

Issue 4658 - monitor - connection start date is incorrect

Issue 2621 - lib389 - backport ds_supports_new_changelog()

Issue 4656 - Make replication CLI backwards compatible with role name
change

Issue 4656 - Remove problematic language from UI/CLI/lib389

Issue 4459 - lib389 - Default paths should use dse.ldif if the server
is down

Issue 4663 - CLI - unable to add objectclass/attribute without
x-origin

Bump version to 1.4.3.21 :

Issue 4169 - UI - updates on the tuning page are not reflected in the
UI

Issue 4588 - BUG - unable to compile without xcrypt (#4589)

Issue 4513 - Fix replication CI test failures (#4557)

Issue 4646 - CLI/UI - revise DNA plugin management

Issue 4644 - Large updates can reset the CLcache to the beginning of
the changelog (#4647)

Issue 4649 - crash in sync_repl when a MODRDN create a cenotaph
(#4652)

Issue 4615 - log message when psearch first exceeds max threads per
conn

Bump version to 1.4.3.20 :

Issue 4324 - Some architectures the cache line size file does not
exist

Issue 4593 - RFE - Print help when nsSSLPersonalitySSL is not found
(#4614)

Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.suse.com/show_bug.cgi?id=1185356"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://github.com/389ds/389-ds-base/issues/2736"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://www.suse.com/security/cve/CVE-2021-3514/"
  );
  # https://www.suse.com/support/update/announcement/2021/suse-su-20211878-1
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?7cf96dc4"
  );
  script_set_attribute(
    attribute:"solution",
    value:
"To install this SUSE Security Update use the SUSE recommended
installation methods like YaST online_update or 'zypper patch'.

Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Module for Server Applications 15-SP2 :

zypper in -t patch
SUSE-SLE-Module-Server-Applications-15-SP2-2021-1878=1"
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:389-ds");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:389-ds-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:389-ds-debugsource");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:389-ds-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:lib389");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libsvrcore0");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libsvrcore0-debuginfo");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:15");

  script_set_attribute(attribute:"vuln_publication_date", value:"2021/05/28");
  script_set_attribute(attribute:"patch_publication_date", value:"2021/06/08");
  script_set_attribute(attribute:"plugin_publication_date", value:"2021/06/09");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"SuSE Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE");
os_ver = os_ver[1];
if (! preg(pattern:"^(SLES15)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLES15", "SUSE " + os_ver);

if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu);

sp = get_kb_item("Host/SuSE/patchlevel");
if (isnull(sp)) sp = "0";
if (os_ver == "SLES15" && (! preg(pattern:"^(2)$", string:sp))) audit(AUDIT_OS_NOT, "SLES15 SP2", os_ver + " SP" + sp);


flag = 0;
if (rpm_check(release:"SLES15", sp:"2", reference:"389-ds-1.4.3.23~git0.f53d0132b-3.15.1")) flag++;
if (rpm_check(release:"SLES15", sp:"2", reference:"389-ds-debuginfo-1.4.3.23~git0.f53d0132b-3.15.1")) flag++;
if (rpm_check(release:"SLES15", sp:"2", reference:"389-ds-debugsource-1.4.3.23~git0.f53d0132b-3.15.1")) flag++;
if (rpm_check(release:"SLES15", sp:"2", reference:"389-ds-devel-1.4.3.23~git0.f53d0132b-3.15.1")) flag++;
if (rpm_check(release:"SLES15", sp:"2", reference:"lib389-1.4.3.23~git0.f53d0132b-3.15.1")) flag++;
if (rpm_check(release:"SLES15", sp:"2", reference:"libsvrcore0-1.4.3.23~git0.f53d0132b-3.15.1")) flag++;
if (rpm_check(release:"SLES15", sp:"2", reference:"libsvrcore0-debuginfo-1.4.3.23~git0.f53d0132b-3.15.1")) flag++;


if (flag)
{
  if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
  else security_warning(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "389-ds");
}