<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">ldb-tools-2.3.0-1.3 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10911</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">ldb-tools-2.3.0-1.3 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the ldb-tools-2.3.0-1.3 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10911</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10911</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1140/</URL>
      <Description>SUSE CVE CVE-2018-1140 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3824/</URL>
      <Description>SUSE CVE CVE-2019-3824 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10700/</URL>
      <Description>SUSE CVE CVE-2020-10700 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10730/</URL>
      <Description>SUSE CVE CVE-2020-10730 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27840/</URL>
      <Description>SUSE CVE CVE-2020-27840 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-20277/</URL>
      <Description>SUSE CVE CVE-2021-20277 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ldb-tools-2.3.0-1.3">
      <FullProductName ProductID="ldb-tools-2.3.0-1.3">ldb-tools-2.3.0-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libldb-devel-2.3.0-1.3">
      <FullProductName ProductID="libldb-devel-2.3.0-1.3">libldb-devel-2.3.0-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libldb2-2.3.0-1.3">
      <FullProductName ProductID="libldb2-2.3.0-1.3">libldb2-2.3.0-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libldb2-32bit-2.3.0-1.3">
      <FullProductName ProductID="libldb2-32bit-2.3.0-1.3">libldb2-32bit-2.3.0-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-ldb-2.3.0-1.3">
      <FullProductName ProductID="python3-ldb-2.3.0-1.3">python3-ldb-2.3.0-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-ldb-32bit-2.3.0-1.3">
      <FullProductName ProductID="python3-ldb-32bit-2.3.0-1.3">python3-ldb-32bit-2.3.0-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-ldb-devel-2.3.0-1.3">
      <FullProductName ProductID="python3-ldb-devel-2.3.0-1.3">python3-ldb-devel-2.3.0-1.3</FullProductName>
    </Branch>
    <Relationship ProductReference="ldb-tools-2.3.0-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ldb-tools-2.3.0-1.3">ldb-tools-2.3.0-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libldb-devel-2.3.0-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libldb-devel-2.3.0-1.3">libldb-devel-2.3.0-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libldb2-2.3.0-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libldb2-2.3.0-1.3">libldb2-2.3.0-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libldb2-32bit-2.3.0-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libldb2-32bit-2.3.0-1.3">libldb2-32bit-2.3.0-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-ldb-2.3.0-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python3-ldb-2.3.0-1.3">python3-ldb-2.3.0-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-ldb-32bit-2.3.0-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python3-ldb-32bit-2.3.0-1.3">python3-ldb-32bit-2.3.0-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-ldb-devel-2.3.0-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python3-ldb-devel-2.3.0-1.3">python3-ldb-devel-2.3.0-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A missing input sanitization flaw was found in the implementation of LDP database used for the LDAP server. An attacker could use this flaw to cause a denial of service against a samba server, used as a Active Directory Domain Controller. All versions of Samba from 4.8.0 onwards are vulnerable</Note>
    </Notes>
    <CVE>CVE-2018-1140</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ldb-tools-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libldb-devel-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libldb2-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libldb2-32bit-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-ldb-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-ldb-32bit-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-ldb-devel-2.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1140.html</URL>
        <Description>CVE-2018-1140</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1095056</URL>
        <Description>SUSE Bug 1095056</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the way an LDAP search expression could crash the shared LDAP server process of a samba AD DC in samba before version 4.10. An authenticated user, having read permissions on the LDAP server, could use this flaw to cause denial of service.</Note>
    </Notes>
    <CVE>CVE-2019-3824</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ldb-tools-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libldb-devel-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libldb2-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libldb2-32bit-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-ldb-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-ldb-32bit-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-ldb-devel-2.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3824.html</URL>
        <Description>CVE-2019-3824</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125410</URL>
        <Description>SUSE Bug 1125410</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130703</URL>
        <Description>SUSE Bug 1130703</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free flaw was found in the way samba AD DC LDAP servers, handled 'Paged Results' control is combined with the 'ASQ' control. A malicious user in a samba AD could use this flaw to cause denial of service. This issue affects all samba versions before 4.10.15, before 4.11.8 and before 4.12.2.</Note>
    </Notes>
    <CVE>CVE-2020-10700</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ldb-tools-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libldb-devel-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libldb2-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libldb2-32bit-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-ldb-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-ldb-32bit-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-ldb-devel-2.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10700.html</URL>
        <Description>CVE-2020-10700</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1169850</URL>
        <Description>SUSE Bug 1169850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173159</URL>
        <Description>SUSE Bug 1173159</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A NULL pointer dereference, or possible use-after-free flaw was found in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is shipped with the libldb package. This flaw allows an authenticated user to possibly trigger a use-after-free or NULL pointer dereference. The highest threat from this vulnerability is to system availability.</Note>
    </Notes>
    <CVE>CVE-2020-10730</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ldb-tools-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libldb-devel-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libldb2-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libldb2-32bit-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-ldb-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-ldb-32bit-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-ldb-devel-2.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10730.html</URL>
        <Description>CVE-2020-10730</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173159</URL>
        <Description>SUSE Bug 1173159</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in samba. Spaces used in a string around a domain name (DN), while supposed to be ignored, can cause invalid DN strings with spaces to instead write a zero-byte into out-of-bounds memory, resulting in a crash. The highest threat from this vulnerability is to system availability.</Note>
    </Notes>
    <CVE>CVE-2020-27840</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ldb-tools-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libldb-devel-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libldb2-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libldb2-32bit-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-ldb-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-ldb-32bit-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-ldb-devel-2.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27840.html</URL>
        <Description>CVE-2020-27840</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183572</URL>
        <Description>SUSE Bug 1183572</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in Samba's libldb. Multiple, consecutive leading spaces in an LDAP attribute can lead to an out-of-bounds memory write, leading to a crash of the LDAP server process handling the request. The highest threat from this vulnerability is to system availability.</Note>
    </Notes>
    <CVE>CVE-2021-20277</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ldb-tools-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libldb-devel-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libldb2-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libldb2-32bit-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-ldb-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-ldb-32bit-2.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-ldb-devel-2.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-20277.html</URL>
        <Description>CVE-2021-20277</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183574</URL>
        <Description>SUSE Bug 1183574</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
