Ubuntu 6596-1: Apache::Session::LDAP vulnerability
Summary
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS (Available with Ubuntu Pro) - Ubuntu 16.04 LTS (Available with Ubuntu Pro) Summary: Apache::Session::LDAP could be made to expose sensitive information through spoofing if it received invalid X.509 certificate. Software Description: - libapache-session-ldap-perl: Apache::Session::LDAP Perl module - Store Apache Session in LDAP Details: It was discovered that Apache::Session::LDAP incorrectly handled invalid X.509 certificates. If a user or an automated system were tricked into opening a specially crafted invalid X.509 certificate, a remote attacker could possibly use this issue to perform spoofing and obtain sensitive information.
Update Instructions
The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: libapache-session-ldap-perl 0.4-1+deb10u1build0.20.04.1 Ubuntu 18.04 LTS (Available with Ubuntu Pro): libapache-session-ldap-perl 0.4-1ubuntu0.18.04.1~esm1 Ubuntu 16.04 LTS (Available with Ubuntu Pro): libapache-session-ldap-perl 0.4-1ubuntu0.16.04.1~esm1 In general, a standard system update will make all the necessary changes.
References
https://ubuntu.com/security/notices/USN-6596-1
CVE-2020-36658
Package Information
https://launchpad.net/ubuntu/+source/libapache-session-ldap-perl/0.4-1+deb10u1build0.20.04.1