Linux Security
Linux Security
Linux Security

RedHat: RHSA-2021-1213:01 Important: libldb security update

Date 15 Apr 2021
279
Posted By LinuxSecurity Advisories
An update for libldb is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: libldb security update
Advisory ID:       RHSA-2021:1213-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:1213
Issue date:        2021-04-15
CVE Names:         CVE-2021-20277 
=====================================================================

1. Summary:

An update for libldb is now available for Red Hat Enterprise Linux 8.2
Extended Update Support.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux BaseOS EUS (v. 8.2) - aarch64, ppc64le, s390x, x86_64

3. Description:

The libldb packages provide an extensible library that implements an
LDAP-like API to access remote LDAP servers, or use local TDB databases.

Security Fix(es):

* samba: Out of bounds read in AD DC LDAP server (CVE-2021-20277)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1941402 - CVE-2021-20277 samba: Out of bounds read in AD DC LDAP server

6. Package List:

Red Hat Enterprise Linux BaseOS EUS (v. 8.2):

Source:
libldb-2.0.7-4.el8_2.src.rpm

aarch64:
ldb-tools-2.0.7-4.el8_2.aarch64.rpm
ldb-tools-debuginfo-2.0.7-4.el8_2.aarch64.rpm
libldb-2.0.7-4.el8_2.aarch64.rpm
libldb-debuginfo-2.0.7-4.el8_2.aarch64.rpm
libldb-debugsource-2.0.7-4.el8_2.aarch64.rpm
libldb-devel-2.0.7-4.el8_2.aarch64.rpm
python3-ldb-2.0.7-4.el8_2.aarch64.rpm
python3-ldb-debuginfo-2.0.7-4.el8_2.aarch64.rpm

ppc64le:
ldb-tools-2.0.7-4.el8_2.ppc64le.rpm
ldb-tools-debuginfo-2.0.7-4.el8_2.ppc64le.rpm
libldb-2.0.7-4.el8_2.ppc64le.rpm
libldb-debuginfo-2.0.7-4.el8_2.ppc64le.rpm
libldb-debugsource-2.0.7-4.el8_2.ppc64le.rpm
libldb-devel-2.0.7-4.el8_2.ppc64le.rpm
python3-ldb-2.0.7-4.el8_2.ppc64le.rpm
python3-ldb-debuginfo-2.0.7-4.el8_2.ppc64le.rpm

s390x:
ldb-tools-2.0.7-4.el8_2.s390x.rpm
ldb-tools-debuginfo-2.0.7-4.el8_2.s390x.rpm
libldb-2.0.7-4.el8_2.s390x.rpm
libldb-debuginfo-2.0.7-4.el8_2.s390x.rpm
libldb-debugsource-2.0.7-4.el8_2.s390x.rpm
libldb-devel-2.0.7-4.el8_2.s390x.rpm
python3-ldb-2.0.7-4.el8_2.s390x.rpm
python3-ldb-debuginfo-2.0.7-4.el8_2.s390x.rpm

x86_64:
ldb-tools-2.0.7-4.el8_2.x86_64.rpm
ldb-tools-debuginfo-2.0.7-4.el8_2.i686.rpm
ldb-tools-debuginfo-2.0.7-4.el8_2.x86_64.rpm
libldb-2.0.7-4.el8_2.i686.rpm
libldb-2.0.7-4.el8_2.x86_64.rpm
libldb-debuginfo-2.0.7-4.el8_2.i686.rpm
libldb-debuginfo-2.0.7-4.el8_2.x86_64.rpm
libldb-debugsource-2.0.7-4.el8_2.i686.rpm
libldb-debugsource-2.0.7-4.el8_2.x86_64.rpm
libldb-devel-2.0.7-4.el8_2.i686.rpm
libldb-devel-2.0.7-4.el8_2.x86_64.rpm
python3-ldb-2.0.7-4.el8_2.i686.rpm
python3-ldb-2.0.7-4.el8_2.x86_64.rpm
python3-ldb-debuginfo-2.0.7-4.el8_2.i686.rpm
python3-ldb-debuginfo-2.0.7-4.el8_2.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-20277
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=TQJ4
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
This email address is being protected from spambots. You need JavaScript enabled to view it.
https://listman.redhat.com/mailman/listinfo/rhsa-announce

Advisories

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
/main-polls/52-how-frequently-do-you-patch-update-your-system?task=poll.vote&format=json
52
radio
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"66","type":"x","order":"1","pct":75.86,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"14","type":"x","order":"2","pct":16.09,"resources":[]},{"id":"181","title":"Hardly ever","votes":"7","type":"x","order":"3","pct":8.05,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.

VOTE ON THE POLL PAGE


VIEW MORE POLLS

bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.