{"affected":[{"ecosystem_specific":{"binaries":[{"libldap-2_4-2":"2.4.46-9.40.1","libldap-2_4-2-32bit":"2.4.46-9.40.1","libldap-data":"2.4.46-9.40.1","openldap2-client":"2.4.46-9.40.1","openldap2-devel":"2.4.46-9.40.1","openldap2-devel-static":"2.4.46-9.40.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP1","name":"openldap2","purl":"pkg:rpm/suse/openldap2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.46-9.40.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libldap-2_4-2":"2.4.46-9.40.1","libldap-2_4-2-32bit":"2.4.46-9.40.1","libldap-data":"2.4.46-9.40.1","openldap2-client":"2.4.46-9.40.1","openldap2-devel":"2.4.46-9.40.1","openldap2-devel-static":"2.4.46-9.40.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP2","name":"openldap2","purl":"pkg:rpm/suse/openldap2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.46-9.40.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"openldap2-devel-32bit":"2.4.46-9.40.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Development Tools 15 SP1","name":"openldap2","purl":"pkg:rpm/suse/openldap2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.46-9.40.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"openldap2-devel-32bit":"2.4.46-9.40.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Development Tools 15 SP2","name":"openldap2","purl":"pkg:rpm/suse/openldap2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.46-9.40.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"openldap2":"2.4.46-9.40.1","openldap2-back-meta":"2.4.46-9.40.1","openldap2-back-perl":"2.4.46-9.40.1","openldap2-ppolicy-check-password":"1.2-9.40.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Legacy 15 SP1","name":"openldap2","purl":"pkg:rpm/suse/openldap2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.46-9.40.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"openldap2":"2.4.46-9.40.1","openldap2-back-meta":"2.4.46-9.40.1","openldap2-back-perl":"2.4.46-9.40.1","openldap2-ppolicy-check-password":"1.2-9.40.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Legacy 15 SP2","name":"openldap2","purl":"pkg:rpm/suse/openldap2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.46-9.40.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libldap-2_4-2":"2.4.46-9.40.1","libldap-2_4-2-32bit":"2.4.46-9.40.1","libldap-data":"2.4.46-9.40.1","openldap2-client":"2.4.46-9.40.1","openldap2-devel":"2.4.46-9.40.1","openldap2-devel-32bit":"2.4.46-9.40.1","openldap2-devel-static":"2.4.46-9.40.1","openldap2-ppolicy-check-password":"1.2-9.40.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15-ESPOS","name":"openldap2","purl":"pkg:rpm/suse/openldap2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.46-9.40.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libldap-2_4-2":"2.4.46-9.40.1","libldap-2_4-2-32bit":"2.4.46-9.40.1","libldap-data":"2.4.46-9.40.1","openldap2-client":"2.4.46-9.40.1","openldap2-devel":"2.4.46-9.40.1","openldap2-devel-32bit":"2.4.46-9.40.1","openldap2-devel-static":"2.4.46-9.40.1","openldap2-ppolicy-check-password":"1.2-9.40.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15-LTSS","name":"openldap2","purl":"pkg:rpm/suse/openldap2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.46-9.40.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libldap-2_4-2":"2.4.46-9.40.1","libldap-2_4-2-32bit":"2.4.46-9.40.1","libldap-data":"2.4.46-9.40.1","openldap2":"2.4.46-9.40.1","openldap2-back-meta":"2.4.46-9.40.1","openldap2-back-perl":"2.4.46-9.40.1","openldap2-client":"2.4.46-9.40.1","openldap2-devel":"2.4.46-9.40.1","openldap2-devel-32bit":"2.4.46-9.40.1","openldap2-devel-static":"2.4.46-9.40.1","openldap2-ppolicy-check-password":"1.2-9.40.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15-LTSS","name":"openldap2","purl":"pkg:rpm/suse/openldap2&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.46-9.40.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libldap-2_4-2":"2.4.46-9.40.1","libldap-2_4-2-32bit":"2.4.46-9.40.1","libldap-data":"2.4.46-9.40.1","openldap2":"2.4.46-9.40.1","openldap2-back-meta":"2.4.46-9.40.1","openldap2-back-perl":"2.4.46-9.40.1","openldap2-client":"2.4.46-9.40.1","openldap2-devel":"2.4.46-9.40.1","openldap2-devel-32bit":"2.4.46-9.40.1","openldap2-devel-static":"2.4.46-9.40.1","openldap2-ppolicy-check-password":"1.2-9.40.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15","name":"openldap2","purl":"pkg:rpm/suse/openldap2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.46-9.40.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for openldap2 fixes the following issues:\n\n- CVE-2020-25692: Fixed an unauthenticated remote denial of service due to incorrect validation of modrdn equality rules (bsc#1178387).\n","id":"SUSE-SU-2020:3313-1","modified":"2020-11-12T15:08:24Z","published":"2020-11-12T15:08:24Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2020/suse-su-20203313-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1178387"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25692"}],"related":["CVE-2020-25692"],"summary":"Security update for openldap2","upstream":["CVE-2020-25692"]}