- Issued:
- 2016-01-08
- Updated:
- 2016-01-08
RHSA-2016:0014 - Security Advisory
Synopsis
Moderate: libldb security update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated libldb packages that fix two security issues are now available for
Red Hat Gluster Storage 3.1.
Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Description
The libldb packages provide an extensible library that implements an
LDAP-like API to access remote LDAP servers, or use local TDB databases.
A denial of service flaw was found in the ldb_wildcard_compare() function
of libldb. A remote attacker could send a specially crafted packet that,
when processed by an application using libldb (for example the AD LDAP
server in Samba), would cause that application to consume an excessive
amount of memory and crash. (CVE-2015-3223)
A memory-read flaw was found in the way the libldb library processed LDB DN
records with a null byte. An authenticated, remote attacker could use this
flaw to read heap-memory pages from the server. (CVE-2015-5330)
Red Hat would like to thank the Samba project for reporting these issues.
Upstream acknowledges Thilo Uttendorfer as the original reporter of
CVE-2015-3223, and Douglas Bagnall as the original reporter of
CVE-2015-5330.
All libldb users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Gluster Storage Server for On-premise 3 for RHEL 7 x86_64
- Red Hat Gluster Storage Server for On-premise 3 for RHEL 6 x86_64
Fixes
- BZ - 1281326 - CVE-2015-5330 samba, libldb: remote memory read in the Samba LDAP server
- BZ - 1290287 - CVE-2015-3223 libldb: Remote DoS in Samba (AD) LDAP server
Red Hat Gluster Storage Server for On-premise 3 for RHEL 7
SRPM | |
---|---|
libldb-1.1.20-3.el7rhgs.src.rpm | SHA-256: 4c421b4a638844819614dbb8fab951aa1e3205728a0ceb627a14b25ef93292bc |
x86_64 | |
ldb-tools-1.1.20-3.el7rhgs.x86_64.rpm | SHA-256: 609dfdfffeebc2d08cc69bdb1be522212864ad41cf1aab4a156a823e2db3a252 |
libldb-1.1.20-3.el7rhgs.x86_64.rpm | SHA-256: 3fe97806c7f7e61e7dba01b6b1d01a5719f3005e5b201cf1942212990d8b15ed |
libldb-debuginfo-1.1.20-3.el7rhgs.x86_64.rpm | SHA-256: 15cbe0d96cd460d572bb4dfb4c0a3a146910c864ac5b25fadb553e9dea80c4e2 |
libldb-devel-1.1.20-3.el7rhgs.x86_64.rpm | SHA-256: 45c788b1d86f0e8a5017f143ee3ac92e2551ef6fefe2e3c1f539d464c74e043a |
pyldb-1.1.20-3.el7rhgs.x86_64.rpm | SHA-256: 7af88feb3babe270b40cfffe5e679250ef6e3c4c5a315bae290863091e87e740 |
pyldb-devel-1.1.20-3.el7rhgs.x86_64.rpm | SHA-256: 90f2525fafb0fd25a6cf5c5e8f8082e6670e3048a29726513c3acd1d0a3d6eb2 |
Red Hat Gluster Storage Server for On-premise 3 for RHEL 6
SRPM | |
---|---|
libldb-1.1.20-3.el6rhs.src.rpm | SHA-256: fd6cd49fc89a6bfb1a67959f9c83f47fd4eb1d51d46e43fd34938257ffab91c0 |
x86_64 | |
ldb-tools-1.1.20-3.el6rhs.x86_64.rpm | SHA-256: c3eabcfcdabad80264481871499372d1058e0728632a89ebf94b6f3c8228604f |
libldb-1.1.20-3.el6rhs.x86_64.rpm | SHA-256: 17778f8781528d592e62080dd35d01ae5d64a7cbf24ba2878148cf3df846c664 |
libldb-debuginfo-1.1.20-3.el6rhs.x86_64.rpm | SHA-256: 6141c4bbe8cadcd956663092cd119f160cb6477f3e98d4cad25ae3e23495fa18 |
libldb-devel-1.1.20-3.el6rhs.x86_64.rpm | SHA-256: 843dc3ee4c07d75d89d7466ea41319cb34c1fd2efe2c81c44d927ae4d14ba008 |
pyldb-1.1.20-3.el6rhs.x86_64.rpm | SHA-256: 5e5ba2aa4c8256df3b4417ea651c16e5736faa0b42beacca56b4740b47c42ea5 |
pyldb-devel-1.1.20-3.el6rhs.x86_64.rpm | SHA-256: 54cef1a558cb4a7b5d80d5a8c3633d8f855b236d7d1c02b4b837f2ef2f03b0f1 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.