==========================================================================
Ubuntu Security Notice USN-4352-2
May 06, 2020
openldap vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.04 ESM
– Ubuntu 12.04 ESM
Summary:
OpenLDAP could be made to crash if it received specially crafted
network traffic.
Software Description:
– openldap: Lightweight Directory Access Protocol
Details:
USN-4352-1 fixed a vulnerability in OpenLDAP. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
Original advisory details:
It was discovered that OpenLDAP incorrectly handled certain queries. A
remote attacker could possibly use this issue to cause OpenLDAP to consume
resources, resulting in a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 ESM:
slapd 2.4.31-1+nmu2ubuntu8.5+esm2
Ubuntu 12.04 ESM:
slapd 2.4.28-1.1ubuntu4.10
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4352-2
https://usn.ubuntu.com/4352-1
CVE-2020-12243
—–BEGIN PGP SIGNATURE—–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=P1Fb
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-4352-1
May 06, 2020
openldap vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 20.04 LTS
– Ubuntu 19.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
Summary:
OpenLDAP could be made to crash if it received specially crafted network
traffic.
Software Description:
– openldap: Lightweight Directory Access Protocol
Details:
It was discovered that OpenLDAP incorrectly handled certain queries. A
remote attacker could possibly use this issue to cause OpenLDAP to consume
resources, resulting in a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS:
slapd 2.4.49+dfsg-2ubuntu1.2
Ubuntu 19.10:
slapd 2.4.48+dfsg-1ubuntu1.1
Ubuntu 18.04 LTS:
slapd 2.4.45+dfsg-1ubuntu1.5
Ubuntu 16.04 LTS:
slapd 2.4.42+dfsg-2ubuntu3.8
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4352-1
CVE-2020-12243
Package Information:
https://launchpad.net/ubuntu/+source/openldap/2.4.49+dfsg-2ubuntu1.2
https://launchpad.net/ubuntu/+source/openldap/2.4.48+dfsg-1ubuntu1.1
https://launchpad.net/ubuntu/+source/openldap/2.4.45+dfsg-1ubuntu1.5
https://launchpad.net/ubuntu/+source/openldap/2.4.42+dfsg-2ubuntu3.8
—–BEGIN PGP SIGNATURE—–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=QFkv
—–END PGP SIGNATURE—–
—