Описание
Security update for openldap2
openldap2 was updated to fix three security issues and one non-security bug.
The following vulnerabilities were fixed:
The following non-security bug was fixed:
Security Issues:
Список пакетов
SUSE Linux Enterprise Desktop 11 SP3
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Server 11 SP3-TERADATA
SUSE Linux Enterprise Server 11-SECURITY
SUSE Linux Enterprise Server for SAP Applications 11 SP3
SUSE Linux Enterprise Software Development Kit 11 SP3
Ссылки
- Link for SUSE-SU-2015:0887-1
- E-Mail link for SUSE-SU-2015:0887-1
- SUSE Security Ratings
- SUSE Bug 846389
- SUSE Bug 905959
- SUSE Bug 916897
- SUSE Bug 916914
- SUSE CVE CVE-2013-4449 page
- SUSE CVE CVE-2015-1545 page
- SUSE CVE CVE-2015-1546 page
Описание
The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.
Затронутые продукты
Ссылки
- CVE-2013-4449
- SUSE Bug 846389
- SUSE Bug 916897
- SUSE Bug 916914
Описание
The deref_parseCtrl function in servers/slapd/overlays/deref.c in OpenLDAP 2.4.13 through 2.4.40 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an empty attribute list in a deref control in a search request.
Затронутые продукты
Ссылки
- CVE-2015-1545
- SUSE Bug 846389
- SUSE Bug 916897
- SUSE Bug 916914
Описание
Double free vulnerability in the get_vrFilter function in servers/slapd/filter.c in OpenLDAP 2.4.40 allows remote attackers to cause a denial of service (crash) via a crafted search query with a matched values control.
Затронутые продукты
Ссылки
- CVE-2015-1546
- SUSE Bug 916914