USN-7698-1

Source
https://ubuntu.com/security/notices/USN-7698-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7698-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-7698-1
Upstream
Related
Published
2025-08-17T23:37:06.648177Z
Modified
2025-10-13T04:42:15Z
Summary
openldap vulnerabilities
Details

It was discovered that OpenLDAP incorrectly handled Certificate Exact Assertion processing. A remote attacker could possibly use this issue to cause OpenLDAP to crash, resulting in a denial of service. (CVE-2020-36221)

It was discovered that OpenLDAP incorrectly handled saslAuthzTo processing. A remote attacker could use this issue to cause OpenLDAP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-36222, CVE-2020-36224, CVE-2020-36225, CVE-2020-36226)

It was discovered that OpenLDAP incorrectly handled Return Filter control handling. A remote attacker could use this issue to cause OpenLDAP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-36223)

It was discovered that OpenLDAP incorrectly handled certain cancel operations. A remote attacker could possibly use this issue to cause OpenLDAP to crash, resulting in a denial of service. (CVE-2020-36227)

It was discovered that OpenLDAP incorrectly handled Certificate List Extract Assertion processing. A remote attacker could possibly use this issue to cause OpenLDAP to crash, resulting in a denial of service. (CVE-2020-36228)

References

Affected packages

Ubuntu:Pro:14.04:LTS / openldap

Package

Name
openldap
Purl
pkg:deb/ubuntu/openldap@2.4.31-1+nmu2ubuntu8.5+esm7?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.31-1+nmu2ubuntu8.5+esm7

Affected versions

2.*

2.4.31-1+nmu2ubuntu3
2.4.31-1+nmu2ubuntu4
2.4.31-1+nmu2ubuntu5
2.4.31-1+nmu2ubuntu8
2.4.31-1+nmu2ubuntu8.1
2.4.31-1+nmu2ubuntu8.2
2.4.31-1+nmu2ubuntu8.3
2.4.31-1+nmu2ubuntu8.4
2.4.31-1+nmu2ubuntu8.5
2.4.31-1+nmu2ubuntu8.5+esm1
2.4.31-1+nmu2ubuntu8.5+esm2
2.4.31-1+nmu2ubuntu8.5+esm3
2.4.31-1+nmu2ubuntu8.5+esm4
2.4.31-1+nmu2ubuntu8.5+esm5
2.4.31-1+nmu2ubuntu8.5+esm6

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "ldap-utils",
            "binary_version": "2.4.31-1+nmu2ubuntu8.5+esm7"
        },
        {
            "binary_name": "libldap-2.4-2",
            "binary_version": "2.4.31-1+nmu2ubuntu8.5+esm7"
        },
        {
            "binary_name": "libldap2-dev",
            "binary_version": "2.4.31-1+nmu2ubuntu8.5+esm7"
        },
        {
            "binary_name": "slapd",
            "binary_version": "2.4.31-1+nmu2ubuntu8.5+esm7"
        },
        {
            "binary_name": "slapd-smbk5pwd",
            "binary_version": "2.4.31-1+nmu2ubuntu8.5+esm7"
        }
    ]
}

Database specific

{
    "cves_map": {
        "ecosystem": "Ubuntu:Pro:14.04:LTS",
        "cves": [
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2020-36221"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2020-36222"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2020-36223"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2020-36224"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2020-36225"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2020-36226"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2020-36227"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2020-36228"
            }
        ]
    }
}