Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2020-15719: SUSE Linux Security Advisory

Back to Search

SUSE: CVE-2020-15719: SUSE Linux Security Advisory

Severity
4
CVSS
(AV:N/AC:H/Au:N/C:P/I:P/A:N)
Published
07/14/2020
Created
09/15/2020
Added
09/13/2020
Modified
09/13/2020

Description

libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.

Solution(s)

  • suse-upgrade-libldap-2_4-2
  • suse-upgrade-libldap-2_4-2-32bit
  • suse-upgrade-libldap-2_4-2-32bit-debuginfo
  • suse-upgrade-libldap-2_4-2-debuginfo
  • suse-upgrade-libldap-data
  • suse-upgrade-openldap2
  • suse-upgrade-openldap2-back-meta
  • suse-upgrade-openldap2-back-meta-debuginfo
  • suse-upgrade-openldap2-back-perl
  • suse-upgrade-openldap2-back-perl-debuginfo
  • suse-upgrade-openldap2-back-sock
  • suse-upgrade-openldap2-back-sock-debuginfo
  • suse-upgrade-openldap2-back-sql
  • suse-upgrade-openldap2-back-sql-debuginfo
  • suse-upgrade-openldap2-client
  • suse-upgrade-openldap2-client-debuginfo
  • suse-upgrade-openldap2-contrib
  • suse-upgrade-openldap2-contrib-debuginfo
  • suse-upgrade-openldap2-debuginfo
  • suse-upgrade-openldap2-debugsource
  • suse-upgrade-openldap2-devel
  • suse-upgrade-openldap2-devel-32bit
  • suse-upgrade-openldap2-devel-static
  • suse-upgrade-openldap2-doc
  • suse-upgrade-openldap2-ppolicy-check-password
  • suse-upgrade-openldap2-ppolicy-check-password-debuginfo

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;