This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============5352403055946329140== Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="96l9ap37DEEBx5SOxGLECB8d47Gpl7f63"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --96l9ap37DEEBx5SOxGLECB8d47Gpl7f63 Content-Type: multipart/mixed; boundary="13hGl3g8vtUDNy4Swy93N8add1aHOj0V4"; protected-headers="v1" From: Marc Deslauriers <marc.deslauriers@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: "ubuntu-security-announce@lists.ubuntu.com" <ubuntu-security-announce@lists.ubuntu.com> Message-ID: <79d7ca20-4abe-0445-2475-83bb3adc852e@canonical.com> Subject: [USN-4724-1] OpenLDAP vulnerabilities
--13hGl3g8vtUDNy4Swy93N8add1aHOj0V4 Content-Type: text/plain; charset=utf-8 Content-Language: en-C Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-4724-1 February 08, 2021
openldap vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.10 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in OpenLDAP.
Software Description: - openldap: Lightweight Directory Access Protocol
Details:
It was discovered that OpenLDAP incorrectly handled Certificate Exact Assertion processing. A remote attacker could possibly use this issue to cause OpenLDAP to crash, resulting in a denial of service. (CVE-2020-36221)
It was discovered that OpenLDAP incorrectly handled saslAuthzTo processing. A remote attacker could use this issue to cause OpenLDAP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-36222, CVE-2020-36224, CVE-2020-36225, CVE-2020-36226)
It was discovered that OpenLDAP incorrectly handled Return Filter control handling. A remote attacker could use this issue to cause OpenLDAP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-36223)
It was discovered that OpenLDAP incorrectly handled certain cancel operations. A remote attacker could possibly use this issue to cause OpenLDAP to crash, resulting in a denial of service. (CVE-2020-36227)
It was discovered that OpenLDAP incorrectly handled Certificate List Extract Assertion processing. A remote attacker could possibly use this issue to cause OpenLDAP to crash, resulting in a denial of service. (CVE-2020-36228)
It was discovered that OpenLDAP incorrectly handled X.509 DN parsing. A remote attacker could possibly use this issue to cause OpenLDAP to crash, resulting in a denial of service. (CVE-2020-36229, CVE-2020-36230)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.10: slapd 2.4.53+dfsg-1ubuntu1.3
Ubuntu 20.04 LTS: slapd 2.4.49+dfsg-2ubuntu1.6
Ubuntu 18.04 LTS: slapd 2.4.45+dfsg-1ubuntu1.9
Ubuntu 16.04 LTS: slapd 2.4.42+dfsg-2ubuntu3.12
In general, a standard system update will make all the necessary changes.
References: https://usn.ubuntu.com/4724-1 CVE-2020-36221, CVE-2020-36222, CVE-2020-36223, CVE-2020-36224, CVE-2020-36225, CVE-2020-36226, CVE-2020-36227, CVE-2020-36228, CVE-2020-36229, CVE-2020-36230
Package Information: https://launchpad.net/ubuntu/+source/openldap/2.4.53+dfsg-1ubuntu1.3 https://launchpad.net/ubuntu/+source/openldap/2.4.49+dfsg-2ubuntu1.6 https://launchpad.net/ubuntu/+source/openldap/2.4.45+dfsg-1ubuntu1.9 https://launchpad.net/ubuntu/+source/openldap/2.4.42+dfsg-2ubuntu3.12
--13hGl3g8vtUDNy4Swy93N8add1aHOj0V4--
--96l9ap37DEEBx5SOxGLECB8d47Gpl7f63 Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature"
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAmAhRcIACgkQZWnYVadE vpM8ug//QWPqUzPVHq8WDzvHFaK9xSbOInSLupnS7QOvPBc/8d48dxDFzonkuG/u +0bY0LWSUbnCHZZTcd+iuoCw9dtg06Oml3E9sVV7vhUzcLoM2mvwGsTFiq3njZiP 7ZnUSukwmaHgrui16qMkdot5SmzgxFkuT+RA1XDX206N5QPKKlDPrtBffcOQdnJh 54/yMPboDzMtm5uerjDukH2HqiibwT6SX10lXF8Y6NJiwlfbyOmA3xwGVQVe0GLD s6EbwOLueUYL6JeG13h2OxMBqRPJhMj9VWW+gI2rFujMLP/yjEOpkXewFS512hHX m9KcsIRbUm6yQPt4F+TwDdzCKUZuB76bre/xZ1rN3YsJ3hImnoJAQNo2IIWXqD1k AK4uO1QjLRFMO/rqlnoP9QWVJZW3vOX5W+clyCMiQ5FtLLjOev62ThuIEET9M8VB UoAJS1M93NPh6nl/XVWgdfF5k8AZ/76E3grdYnqR8X12JQneeECkaajdQipCoCoR Mv50PVKUmSlWkWku//Zuuclv0y58OvtCMoiSuBv35+CVNNDbjAd/S4vhrW/ZKlV2 ngygbCDQQIThywmMAdFtGPXDxa3OqpRNzDo6lzzSH8jFahscZ3tZ8dNMF53RSNGU x745HYqE/YlIZDjcmiP7BJGve9dUUwiGQmqId47kh4aWkyrDP8Y= =QJJx -----END PGP SIGNATURE-----
--96l9ap37DEEBx5SOxGLECB8d47Gpl7f63--
--===============5352403055946329140== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============5352403055946329140==--
|