File _patchinfo of Package patchinfo.4572
<patchinfo incident="4572">
<packager>hguo</packager>
<issue tracker="bnc" id="945582">VUL-0: CVE-2015-6908: openldap2: ber_get_next remote denial of service vulnerability</issue>
<issue tracker="bnc" id="937766">VUL-0: openldap2: The Logjam Attack / weakdh.org</issue>
<issue tracker="bnc" id="955210">getaddrinfo does not return if ldap is used for host lookups in IPv6 environment</issue>
<issue tracker="cve" id="CVE-2015-6908"></issue>
<issue tracker="fate" id="319300"></issue>
<issue tracker="cve" id="CVE-2015-4000"></issue>
<category>security</category>
<rating>important</rating>
<summary>Security update for openldap2</summary>
<description>This update fixes the following security issues:
- CVE-2015-6908: The ber_get_next function allowed remote attackers to cause a denial
of service (reachable assertion and application crash) via crafted BER data, as
demonstrated by an attack against slapd. (bsc#945582)
- CVE-2015-4000: Fix weak Diffie-Hellman size vulnerability. (bsc#937766)
It also fixes the following non-security bugs:
- bsc#955210: Unresponsive LDAP host lookups in IPv6 environment
This update adds the following functionality:
- fate#319300: SHA2 password hashing module that can be loaded on-demand.
This update was imported from the SUSE:SLE-12:Update update project.</description>
</patchinfo>