-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.1569
                         openldap security update
                                5 May 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           openldap
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
Impact/Access:     Denial of Service -- Unknown/Unspecified
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-12243  

Reference:         ESB-2020.1458

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2020/05/msg00001.html

- --------------------------BEGIN INCLUDED TEXT--------------------

Package        : openldap
Version        : 2.4.40+dfsg-1+deb8u6
CVE ID         : CVE-2020-12243


A vulnerability was discovered in OpenLDAP, a free implementation of the
Lightweight Directory Access Protocol. LDAP search filters with nested
boolean expressions can result in denial of service (slapd daemon
crash).

For Debian 8 "Jessie", this problem has been fixed in version
2.4.40+dfsg-1+deb8u6.

We recommend that you upgrade your openldap packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=shLP
-----END PGP SIGNATURE-----