It was discovered that OpenLDAP incorrectly handled rootDN delegation. A database administrator could use this issue to request authorization as an identity from another database, contrary to expectations. (CVE-2019-13057)
It was discovered that OpenLDAP incorrectly handled SASL authentication and session encryption. After a first SASL bind was completed, it was possible to obtain access by performing simple binds, contrary to expectations. (CVE-2019-13565)
{ "availability": "No subscription required", "binaries": [ { "libldap-2.4-2-dbg": "2.4.42+dfsg-2ubuntu3.6", "libldap2-dev-dbgsym": "2.4.42+dfsg-2ubuntu3.6", "slapd-dbg": "2.4.42+dfsg-2ubuntu3.6", "ldap-utils-dbgsym": "2.4.42+dfsg-2ubuntu3.6", "libldap-2.4-2-dbgsym": "2.4.42+dfsg-2ubuntu3.6", "libldap2-dev": "2.4.42+dfsg-2ubuntu3.6", "libldap-2.4-2": "2.4.42+dfsg-2ubuntu3.6", "slapd-smbk5pwd-dbgsym": "2.4.42+dfsg-2ubuntu3.6", "slapd-dbgsym": "2.4.42+dfsg-2ubuntu3.6", "slapd": "2.4.42+dfsg-2ubuntu3.6", "slapd-smbk5pwd": "2.4.42+dfsg-2ubuntu3.6", "ldap-utils": "2.4.42+dfsg-2ubuntu3.6" } ] }
{ "availability": "No subscription required", "binaries": [ { "ldap-utils-dbgsym": "2.4.45+dfsg-1ubuntu1.3", "libldap-2.4-2-dbgsym": "2.4.45+dfsg-1ubuntu1.3", "libldap2-dev": "2.4.45+dfsg-1ubuntu1.3", "libldap-2.4-2": "2.4.45+dfsg-1ubuntu1.3", "slapd-smbk5pwd-dbgsym": "2.4.45+dfsg-1ubuntu1.3", "libldap-common": "2.4.45+dfsg-1ubuntu1.3", "slapd-dbgsym": "2.4.45+dfsg-1ubuntu1.3", "slapd": "2.4.45+dfsg-1ubuntu1.3", "slapd-smbk5pwd": "2.4.45+dfsg-1ubuntu1.3", "ldap-utils": "2.4.45+dfsg-1ubuntu1.3" } ] }