An issue was discovered in the server in OpenLDAP before 2.4.48. When the server administrator delegates rootDN (database admin) privileges for certain databases but wants to maintain isolation (e.g., for multi-tenant deployments), slapd does not properly stop a rootDN from requesting authorization as an identity from another database during a SASL bind or with a proxyAuthz (RFC 4370) control. (It is not a common configuration to deploy a system where the server administrator and a DB administrator enjoy different levels of trust.)
{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "ldap-utils",
"binary_version": "2.4.31-1+nmu2ubuntu8.5+esm1"
},
{
"binary_name": "libldap-2.4-2",
"binary_version": "2.4.31-1+nmu2ubuntu8.5+esm1"
},
{
"binary_name": "libldap2-dev",
"binary_version": "2.4.31-1+nmu2ubuntu8.5+esm1"
},
{
"binary_name": "slapd",
"binary_version": "2.4.31-1+nmu2ubuntu8.5+esm1"
},
{
"binary_name": "slapd-smbk5pwd",
"binary_version": "2.4.31-1+nmu2ubuntu8.5+esm1"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "ldap-utils",
"binary_version": "2.4.42+dfsg-2ubuntu3.6"
},
{
"binary_name": "libldap-2.4-2",
"binary_version": "2.4.42+dfsg-2ubuntu3.6"
},
{
"binary_name": "libldap2-dev",
"binary_version": "2.4.42+dfsg-2ubuntu3.6"
},
{
"binary_name": "slapd",
"binary_version": "2.4.42+dfsg-2ubuntu3.6"
},
{
"binary_name": "slapd-smbk5pwd",
"binary_version": "2.4.42+dfsg-2ubuntu3.6"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "ldap-utils",
"binary_version": "2.4.45+dfsg-1ubuntu1.3"
},
{
"binary_name": "libldap-2.4-2",
"binary_version": "2.4.45+dfsg-1ubuntu1.3"
},
{
"binary_name": "libldap-common",
"binary_version": "2.4.45+dfsg-1ubuntu1.3"
},
{
"binary_name": "libldap2-dev",
"binary_version": "2.4.45+dfsg-1ubuntu1.3"
},
{
"binary_name": "slapd",
"binary_version": "2.4.45+dfsg-1ubuntu1.3"
},
{
"binary_name": "slapd-smbk5pwd",
"binary_version": "2.4.45+dfsg-1ubuntu1.3"
}
]
}