drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in openldap
Name: |
Denial of Service in openldap |
|
ID: |
DSA-4860-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian buster |
|
Datum: |
Sa, 20. Februar 2021, 21:30 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27212 |
|
Applikationen: |
OpenLDAP |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-4860-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso February 20, 2021 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : openldap CVE ID : CVE-2021-27212
A vulnerability in the Certificate List Exact Assertion validation was discovered in OpenLDAP, a free implementation of the Lightweight Directory Access Protocol. An unauthenticated remote attacker can take advantage of this flaw to cause a denial of service (slapd daemon crash) via specially crafted packets.
For the stable distribution (buster), this problem has been fixed in version 2.4.47+dfsg-3+deb10u6.
We recommend that you upgrade your openldap packages.
For the detailed security status of openldap please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openldap
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmAxB1ZfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0SmHBAAiMqRCTYMDJo30lUcNP2wx5ki3QviNZ3N5EgcZDFv0PjjeaYBeJPCfep6 fnaxz+RZNYIWhJR6f5zJF2T44Xc+clSnEk3zrv2je/CnLjrIIMUu/3gr5u+jpqHM XNACqsklc+8ks8x3+RFW25W6BtmNb+++TyXtz+srrkJsWmqc4QbLsv7GP9/w9U5p dJojYDJq7TOHwBbhf2gsFAhG+XfhgVWtI+DV9FKTYQdUx5DdZXjlTVZyOV2kt+Ra cO66cK+saESjtm6tFBDllIZ1ZliPfapLcY5/jdinsvekcwv0LNv672MmLDiAEV6N j/EqF8a7nI4k+yGoppw4/Qbe6+EsnIp44ENUuMVcSpa85G2A1Ul+xq+cPf/WgXW9 5GkWEcddl5NghCVnwCp1CZblRt32ddc+ZCNDGAzhwb1UKAd362fVX6r+TrFGx+Q6 dahwG6FphUHlqGRKTaZmg0+bo5LP9HKLnBWcZnCmAdRxMuGstfj8teaBtP/Zrsft Kx4pt2fGCtb3W63CUvLZ4zOqrb3s/FGMjkDD2H0bjC0/uCyDKtu9Bz99Xqjs6uJX CiNQwuOucJQr0lVBZk0r37uiRVVA8EY//J7rVn255Z5w/orplM+c0kxKmVRTYjvi fpKngqmqe0Dve15d+nqQOjfyrET9r9NuohuFegjqXU4lKt7lSbc= =kL6d -----END PGP SIGNATURE-----
|
|
|
|