-----BEGIN PGP SIGNATURE-----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=asNt
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6616-1
January 30, 2024
openldap vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
OpenLDAP could be made to crash if it received specially crafted input.
Software Description:
- openldap: Lightweight Directory Access Protocol
Details:
It was discovered that OpenLDAP was not properly performing bounds checks
when executing functions related to LDAP URLs. An attacker could possibly
use this issue to cause a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS:
slapd 2.5.16+dfsg-0ubuntu0.22.04.2
Ubuntu 20.04 LTS:
slapd 2.4.49+dfsg-2ubuntu1.10
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6616-1
CVE-2023-2953
Package Information:
https://launchpad.net/ubuntu/+source/openldap/2.5.16+dfsg-0ubuntu0.22.04.2
https://launchpad.net/ubuntu/+source/openldap/2.4.49+dfsg-2ubuntu1.10
No comments:
Post a Comment