It was discovered that OpenLDAP incorrectly handled certain SQL statements
within LDAP queries in the experimental back-sql backend. A remote attacker
could possibly use this issue to perform an SQL injection attack and alter
the database.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 22.04 | noarch | slapd | < 2.5.11+dfsg-1~exp1ubuntu3.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | ldap-utils | < 2.5.11+dfsg-1~exp1ubuntu3.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | ldap-utils-dbgsym | < 2.5.11+dfsg-1~exp1ubuntu3.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | libldap-2.5-0 | < 2.5.11+dfsg-1~exp1ubuntu3.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | libldap-2.5-0-dbgsym | < 2.5.11+dfsg-1~exp1ubuntu3.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | libldap-common | < 2.5.11+dfsg-1~exp1ubuntu3.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | libldap-dev | < 2.5.11+dfsg-1~exp1ubuntu3.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | libldap2-dev | < 2.5.11+dfsg-1~exp1ubuntu3.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | slapd-contrib | < 2.5.11+dfsg-1~exp1ubuntu3.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | slapd-contrib-dbgsym | < 2.5.11+dfsg-1~exp1ubuntu3.1 | UNKNOWN |