openSUSE Security Update: Security update for openldap2
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2019:2176-1
Rating:             moderate
References:         #1073313 #1111388 #1114845 #1143194 #1143273 
                    
Cross-References:   CVE-2017-17740 CVE-2019-13057 CVE-2019-13565
                   
Affected Products:
                    openSUSE Leap 15.0
______________________________________________________________________________

   An update that solves three vulnerabilities and has two
   fixes is now available.

Description:

   This update for openldap2 fixes the following issues:

   Security issue fixed:

   - CVE-2019-13565: Fixed an authentication bypass when using SASL
     authentication and session encryption (bsc#1143194).
   - CVE-2019-13057: Fixed an issue with delegated database admin privileges
     (bsc#1143273).
   - CVE-2017-17740: When both the nops module and the member of overlay are
     enabled, attempts to free a buffer that was allocated on the stack,
     which allows remote attackers to cause a denial of service (slapd crash)
     via a member MODDN operation. (bsc#1073313)

   Non-security issues fixed:

   - Fixed broken shebang line in openldap_update_modules_path.sh
     (bsc#1114845).
   - Create files in /var/lib/ldap/ during initial start to allow for
     transactional updates (bsc#1111388)
   - Fixed incorrect post script call causing tmpfiles creation not to be run
     (bsc#1111388).

   This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.0:

      zypper in -t patch openSUSE-2019-2176=1



Package List:

   - openSUSE Leap 15.0 (i586 x86_64):

      libldap-2_4-2-2.4.46-lp150.13.1
      libldap-2_4-2-debuginfo-2.4.46-lp150.13.1
      openldap2-2.4.46-lp150.13.1
      openldap2-back-meta-2.4.46-lp150.13.1
      openldap2-back-meta-debuginfo-2.4.46-lp150.13.1
      openldap2-back-perl-2.4.46-lp150.13.1
      openldap2-back-perl-debuginfo-2.4.46-lp150.13.1
      openldap2-back-sock-2.4.46-lp150.13.1
      openldap2-back-sock-debuginfo-2.4.46-lp150.13.1
      openldap2-back-sql-2.4.46-lp150.13.1
      openldap2-back-sql-debuginfo-2.4.46-lp150.13.1
      openldap2-client-2.4.46-lp150.13.1
      openldap2-client-debuginfo-2.4.46-lp150.13.1
      openldap2-contrib-2.4.46-lp150.13.1
      openldap2-contrib-debuginfo-2.4.46-lp150.13.1
      openldap2-debuginfo-2.4.46-lp150.13.1
      openldap2-debugsource-2.4.46-lp150.13.1
      openldap2-devel-2.4.46-lp150.13.1
      openldap2-devel-static-2.4.46-lp150.13.1
      openldap2-ppolicy-check-password-1.2-lp150.13.1
      openldap2-ppolicy-check-password-debuginfo-1.2-lp150.13.1

   - openSUSE Leap 15.0 (noarch):

      libldap-data-2.4.46-lp150.13.1
      openldap2-doc-2.4.46-lp150.13.1

   - openSUSE Leap 15.0 (x86_64):

      libldap-2_4-2-32bit-2.4.46-lp150.13.1
      libldap-2_4-2-32bit-debuginfo-2.4.46-lp150.13.1
      openldap2-devel-32bit-2.4.46-lp150.13.1


References:

   https://www.suse.com/security/cve/CVE-2017-17740.html
   https://www.suse.com/security/cve/CVE-2019-13057.html
   https://www.suse.com/security/cve/CVE-2019-13565.html
   https://bugzilla.suse.com/1073313
   https://bugzilla.suse.com/1111388
   https://bugzilla.suse.com/1114845
   https://bugzilla.suse.com/1143194
   https://bugzilla.suse.com/1143273

-- 

openSUSE: 2019:2176-1: moderate: openldap2

September 24, 2019
An update that solves three vulnerabilities and has two fixes is now available.

Description

This update for openldap2 fixes the following issues: Security issue fixed: - CVE-2019-13565: Fixed an authentication bypass when using SASL authentication and session encryption (bsc#1143194). - CVE-2019-13057: Fixed an issue with delegated database admin privileges (bsc#1143273). - CVE-2017-17740: When both the nops module and the member of overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation. (bsc#1073313) Non-security issues fixed: - Fixed broken shebang line in openldap_update_modules_path.sh (bsc#1114845). - Create files in /var/lib/ldap/ during initial start to allow for transactional updates (bsc#1111388) - Fixed incorrect post script call causing tmpfiles creation not to be run (bsc#1111388). This update was imported from the SUSE:SLE-15:Update update project.

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.0: zypper in -t patch openSUSE-2019-2176=1


Package List

- openSUSE Leap 15.0 (i586 x86_64): libldap-2_4-2-2.4.46-lp150.13.1 libldap-2_4-2-debuginfo-2.4.46-lp150.13.1 openldap2-2.4.46-lp150.13.1 openldap2-back-meta-2.4.46-lp150.13.1 openldap2-back-meta-debuginfo-2.4.46-lp150.13.1 openldap2-back-perl-2.4.46-lp150.13.1 openldap2-back-perl-debuginfo-2.4.46-lp150.13.1 openldap2-back-sock-2.4.46-lp150.13.1 openldap2-back-sock-debuginfo-2.4.46-lp150.13.1 openldap2-back-sql-2.4.46-lp150.13.1 openldap2-back-sql-debuginfo-2.4.46-lp150.13.1 openldap2-client-2.4.46-lp150.13.1 openldap2-client-debuginfo-2.4.46-lp150.13.1 openldap2-contrib-2.4.46-lp150.13.1 openldap2-contrib-debuginfo-2.4.46-lp150.13.1 openldap2-debuginfo-2.4.46-lp150.13.1 openldap2-debugsource-2.4.46-lp150.13.1 openldap2-devel-2.4.46-lp150.13.1 openldap2-devel-static-2.4.46-lp150.13.1 openldap2-ppolicy-check-password-1.2-lp150.13.1 openldap2-ppolicy-check-password-debuginfo-1.2-lp150.13.1 - openSUSE Leap 15.0 (noarch): libldap-data-2.4.46-lp150.13.1 openldap2-doc-2.4.46-lp150.13.1 - openSUSE Leap 15.0 (x86_64): libldap-2_4-2-32bit-2.4.46-lp150.13.1 libldap-2_4-2-32bit-debuginfo-2.4.46-lp150.13.1 openldap2-devel-32bit-2.4.46-lp150.13.1


References

https://www.suse.com/security/cve/CVE-2017-17740.html https://www.suse.com/security/cve/CVE-2019-13057.html https://www.suse.com/security/cve/CVE-2019-13565.html https://bugzilla.suse.com/1073313 https://bugzilla.suse.com/1111388 https://bugzilla.suse.com/1114845 https://bugzilla.suse.com/1143194 https://bugzilla.suse.com/1143273--


Severity
Announcement ID: openSUSE-SU-2019:2176-1
Rating: moderate
Affected Products: openSUSE Leap 15.0 le.

Related News