|
|
Log in / Subscribe / Register

Ubuntu alert USN-4724-1 (openldap)

From:  Marc Deslauriers <marc.deslauriers@canonical.com>
To:  "ubuntu-security-announce@lists.ubuntu.com" <ubuntu-security-announce@lists.ubuntu.com>
Subject:  [USN-4724-1] OpenLDAP vulnerabilities
Date:  Mon, 08 Feb 2021 09:08:02 -0500
Message-ID:  <79d7ca20-4abe-0445-2475-83bb3adc852e@canonical.com>

========================================================================== Ubuntu Security Notice USN-4724-1 February 08, 2021 openldap vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.10 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Several security issues were fixed in OpenLDAP. Software Description: - openldap: Lightweight Directory Access Protocol Details: It was discovered that OpenLDAP incorrectly handled Certificate Exact Assertion processing. A remote attacker could possibly use this issue to cause OpenLDAP to crash, resulting in a denial of service. (CVE-2020-36221) It was discovered that OpenLDAP incorrectly handled saslAuthzTo processing. A remote attacker could use this issue to cause OpenLDAP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-36222, CVE-2020-36224, CVE-2020-36225, CVE-2020-36226) It was discovered that OpenLDAP incorrectly handled Return Filter control handling. A remote attacker could use this issue to cause OpenLDAP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-36223) It was discovered that OpenLDAP incorrectly handled certain cancel operations. A remote attacker could possibly use this issue to cause OpenLDAP to crash, resulting in a denial of service. (CVE-2020-36227) It was discovered that OpenLDAP incorrectly handled Certificate List Extract Assertion processing. A remote attacker could possibly use this issue to cause OpenLDAP to crash, resulting in a denial of service. (CVE-2020-36228) It was discovered that OpenLDAP incorrectly handled X.509 DN parsing. A remote attacker could possibly use this issue to cause OpenLDAP to crash, resulting in a denial of service. (CVE-2020-36229, CVE-2020-36230) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.10: slapd 2.4.53+dfsg-1ubuntu1.3 Ubuntu 20.04 LTS: slapd 2.4.49+dfsg-2ubuntu1.6 Ubuntu 18.04 LTS: slapd 2.4.45+dfsg-1ubuntu1.9 Ubuntu 16.04 LTS: slapd 2.4.42+dfsg-2ubuntu3.12 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/4724-1 CVE-2020-36221, CVE-2020-36222, CVE-2020-36223, CVE-2020-36224, CVE-2020-36225, CVE-2020-36226, CVE-2020-36227, CVE-2020-36228, CVE-2020-36229, CVE-2020-36230 Package Information: https://launchpad.net/ubuntu/+source/openldap/2.4.53+dfsg... https://launchpad.net/ubuntu/+source/openldap/2.4.49+dfsg... https://launchpad.net/ubuntu/+source/openldap/2.4.45+dfsg... https://launchpad.net/ubuntu/+source/openldap/2.4.42+dfsg... -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds