it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Salvatore Bonaccorso <carnil AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5140-1] openldap security update
- Date: Thu, 19 May 2022 20:01:35 +0000
- List-archive: https://lists.debian.org/msgid-search/E1nrmL1-00042A-C3 AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Date:Message-Id:Subject:To:From:Reply-To:Cc:MIME-Version :Content-Type:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=aHQuKUKu9w3DBtwH+1BLjORhEysVhU1uXF9bNJCC0TY=; b=FB LAiyJZwgr/zvzSRp8GO7hoAt2DSV3RD31jab33xMiInAm/bk9naxBaONePE6L0hh3y+buQvH2GZKN QXDKVL//H2eovLi7iDJ+ciaK9NatOjVRgiKgJSV9i+8l9eRMEtAImuykpQnSVS4unI2b9Q0oXcLSM 9Mw3yB44XAfknHqxkTU+jdehrfnK1E1CxmTXmQMu9W3RWMT9XtVypKSeyW9/1meRaY+xHTG092lSx Bgiay/piZd0gexWQpY4qSR9DyQ6hWm/q7Kv6okgWduix0rIl/6/IBuvS4+8nExlyXPr0GUay++VOE Elin6A0uaqGyng8kJ51s+LIMrXSSxEgA==;
- Old-return-path: <carnil AT seger.debian.org>
- Priority: urgent
- Resent-date: Thu, 19 May 2022 20:01:57 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <zRlfgvqmg5H.A.-EE.1IqhiB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5140-1 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
May 19, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : openldap
CVE ID : CVE-2022-29155
Jacek Konieczny discovered a SQL injection vulnerability in the back-sql
backend to slapd in OpenLDAP, a free implementation of the Lightweight
Directory Access Protocol, allowing an attacker to alter the database
during an LDAP search operations when a specially crafted search filter
is processed.
For the oldstable distribution (buster), this problem has been fixed
in version 2.4.47+dfsg-3+deb10u7.
For the stable distribution (bullseye), this problem has been fixed in
version 2.4.57+dfsg-3+deb11u1.
We recommend that you upgrade your openldap packages.
For the detailed security status of openldap please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/openldap
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=PNiK
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5140-1] openldap security update, Salvatore Bonaccorso, 19.05.2022
Archiv bereitgestellt durch MHonArc 2.6.24.