-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ----------------------------------------------------------------------- Debian LTS Advisory DLA-2425-1 [email protected] https://www.debian.org/lts/security/ Utkarsh Gupta November 01, 2020 https://wiki.debian.org/LTS - -----------------------------------------------------------------------
Package : openldap Version : 2.4.44+dfsg-5+deb9u5 CVE ID : none assigned yet A vulnerability in the handling of normalization with modrdn was discovered in OpenLDAP, a free implementation of the Lightweight Directory Access Protocol. An unauthenticated remote attacker can use this flaw to cause a denial of service (slapd daemon crash) via a specially crafted packet. For Debian 9 stretch, this problem has been fixed in version 2.4.44+dfsg-5+deb9u5. We recommend that you upgrade your openldap packages. For the detailed security status of openldap please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openldap Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEbJ0QSEqa5Mw4X3xxgj6WdgbDS5YFAl+ecW8ACgkQgj6WdgbD S5YKJBAA5uNSyeFn2jJKu35jXmucDqCLsBACnS2a7biN/zN+is2aQCpk/s+sae5A dOnZklEQNxRqf+mwgP9RBqpuOO0kS/qlEY2rFJPHBhSL2rhPhktjB914OBCMKlGY W1PL0jeOp1+HUK5ELDOFttHijT8AUPyv6WZzIJc04CFNxt/kOMgDzhInXv0KM7Tj lHybNtubOa3xjMWuvCZr2iG8IfNBUjbYOoNzURZEVXcg1munIshmJFgs8u+Zwk54 Yf32BN2xNttHzjWAg0d9b9BX/66EkHBIPUpcvOIdb6gwR7KZ/L66rEoIxAsi4YNs 4BCSZiTOCxn4dFKhHanbGIyp9jiWtEwZ+946eV5532nYLB+OT1PWnOivD/a0WrMO 7culjyRVLnPpswvwi93AtyWiiCrETDnQpZ2hO+Pz91VH4th8KgiXb0BzOlB0aYad QNlrnA015wS6lkgQ1FfkEpqMMHTkE/FLvTqrXrDXhy5DRAL/y93bIE48D5UemmE8 tn8ZJZW3EJmZ+n9z9NSfyD875IAv+0h691q+GCnHhOERTZzynLct7mt+YBz1X3GI LiiuvIce33kfjyYoZfMVmHwDj3nV3uILrbYjEXLX8a0ZmoPU3y96KF8V3UwJtWp4 qbHicHjQyCIPQ6FAlE6r76+GYIYJm7AtV3AlLR2SCabWj6pOiZ8= =XJSg -----END PGP SIGNATURE-----
