openSUSE Security Update: Security update for openldap2
______________________________________________________________________________
Announcement ID:    openSUSE-SU-2019:2176-1
Rating:             moderate
References:         #1073313 #1111388 #1114845 #1143194 #1143273 
Cross-References: CVE-2017-17740 CVE-2019-13057 CVE-2019-13565
Affected Products:
                    openSUSE Leap 15.0
______________________________________________________________________________
   An update that solves three vulnerabilities and has two
   fixes is now available.
Description:
This update for openldap2 fixes the following issues:
Security issue fixed:
   – CVE-2019-13565: Fixed an authentication bypass when using SASL
     authentication and session encryption (bsc#1143194).
   – CVE-2019-13057: Fixed an issue with delegated database admin privileges
     (bsc#1143273).
   – CVE-2017-17740: When both the nops module and the member of overlay are
     enabled, attempts to free a buffer that was allocated on the stack,
     which allows remote attackers to cause a denial of service (slapd crash)
     via a member MODDN operation. (bsc#1073313)
Non-security issues fixed:
   – Fixed broken shebang line in openldap_update_modules_path.sh
     (bsc#1114845).
   – Create files in /var/lib/ldap/ during initial start to allow for
     transactional updates (bsc#1111388)
   – Fixed incorrect post script call causing tmpfiles creation not to be run
     (bsc#1111388).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-2176=1
Package List:
– openSUSE Leap 15.0 (i586 x86_64):
      libldap-2_4-2-2.4.46-lp150.13.1
      libldap-2_4-2-debuginfo-2.4.46-lp150.13.1
      openldap2-2.4.46-lp150.13.1
      openldap2-back-meta-2.4.46-lp150.13.1
      openldap2-back-meta-debuginfo-2.4.46-lp150.13.1
      openldap2-back-perl-2.4.46-lp150.13.1
      openldap2-back-perl-debuginfo-2.4.46-lp150.13.1
      openldap2-back-sock-2.4.46-lp150.13.1
      openldap2-back-sock-debuginfo-2.4.46-lp150.13.1
      openldap2-back-sql-2.4.46-lp150.13.1
      openldap2-back-sql-debuginfo-2.4.46-lp150.13.1
      openldap2-client-2.4.46-lp150.13.1
      openldap2-client-debuginfo-2.4.46-lp150.13.1
      openldap2-contrib-2.4.46-lp150.13.1
      openldap2-contrib-debuginfo-2.4.46-lp150.13.1
      openldap2-debuginfo-2.4.46-lp150.13.1
      openldap2-debugsource-2.4.46-lp150.13.1
      openldap2-devel-2.4.46-lp150.13.1
      openldap2-devel-static-2.4.46-lp150.13.1
      openldap2-ppolicy-check-password-1.2-lp150.13.1
      openldap2-ppolicy-check-password-debuginfo-1.2-lp150.13.1
– openSUSE Leap 15.0 (noarch):
      libldap-data-2.4.46-lp150.13.1
      openldap2-doc-2.4.46-lp150.13.1
– openSUSE Leap 15.0 (x86_64):
      libldap-2_4-2-32bit-2.4.46-lp150.13.1
      libldap-2_4-2-32bit-debuginfo-2.4.46-lp150.13.1
      openldap2-devel-32bit-2.4.46-lp150.13.1
References:
   https://www.suse.com/security/cve/CVE-2017-17740.html
   https://www.suse.com/security/cve/CVE-2019-13057.html
   https://www.suse.com/security/cve/CVE-2019-13565.html
   https://bugzilla.suse.com/1073313
   https://bugzilla.suse.com/1111388
   https://bugzilla.suse.com/1114845
   https://bugzilla.suse.com/1143194
   https://bugzilla.suse.com/1143273
— 
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org



