- -----------------------------------------------------------------------
Debian LTS Advisory DLA-2425-1              debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Utkarsh Gupta
November 01, 2020                           https://wiki.debian.org/LTS
- -----------------------------------------------------------------------

Package        : openldap
Version        : 2.4.44+dfsg-5+deb9u5
CVE ID         : none assigned yet

A vulnerability in the handling of normalization with modrdn was
discovered in OpenLDAP, a free implementation of the Lightweight
Directory Access Protocol. An unauthenticated remote attacker can
use this flaw to cause a denial of service (slapd daemon crash)
via a specially crafted packet.

For Debian 9 stretch, this problem has been fixed in version
2.4.44+dfsg-5+deb9u5.

We recommend that you upgrade your openldap packages.

For the detailed security status of openldap please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/openldap

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-2425-1: openldap security update

November 1, 2020
A vulnerability in the handling of normalization with modrdn was discovered in OpenLDAP, a free implementation of the Lightweight Directory Access Protocol

Summary

For Debian 9 stretch, this problem has been fixed in version
2.4.44+dfsg-5+deb9u5.

We recommend that you upgrade your openldap packages.

For the detailed security status of openldap please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/openldap

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Severity
Package : openldap
Version : 2.4.44+dfsg-5+deb9u5
CVE ID : none assigned yet

Related News