File _patchinfo of Package patchinfo.12229

<patchinfo incident="12229">
  <issue id="1143194" tracker="bnc">VUL-0: CVE-2019-13565: openldap2: successful authorization step completed by one user affects the authorization requirement for a different user</issue> 
  <issue id="1143273" tracker="bnc">VUL-0: CVE-2019-13057: openldap2: slapd does not properly stop a rootDN from requesting authorization as an identity from another database</issue>
  <issue id="2019-13565" tracker="cve" />
  <issue id="2019-13057" tracker="cve" />
  <packager>firstyear</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for openldap2</summary>
  <description>This update for openldap2 fixes the following issues:

Security issues fixed:

- CVE-2019-13565: Fixed ssf memory reuse that leads to incorrect authorization of another connection, granting excess connection rights (ssf) (bsc#1143194).
- CVE-2019-13057: Fixed rootDN of a backend that may proxyauth incorrectly to another backend, violating multi-tenant isolation (bsc#1143273).
</description>
</patchinfo>
openSUSE Build Service is sponsored by