CVE-2020-10730

NameCVE-2020-10730
DescriptionA NULL pointer dereference, or possible use-after-free flaw was found in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is shipped with the libldb package. This flaw allows an authenticated user to possibly trigger a use-after-free or NULL pointer dereference. The highest threat from this vulnerability is to system availability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2463-1, DSA-4884-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ldb (PTS)bullseye (security), bullseye2:2.2.3-2~deb11u2fixed
samba (PTS)bullseye (security), bullseye2:4.13.13+dfsg-1~deb11u6fixed
bookworm, bookworm (security)2:4.17.12+dfsg-0+deb12u1fixed
trixie2:4.20.2+dfsg-7fixed
sid2:4.20.2+dfsg-10fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ldbsourcestretch(not affected)
ldbsourcebuster2:1.5.1+really1.4.6-3+deb10u1DSA-4884-1
ldbsource(unstable)2:2.1.4-1
sambasourcestretch2:4.5.16+dfsg-1+deb9u3DLA-2463-1
sambasource(unstable)2:4.12.5+dfsg-1

Notes

[stretch] - ldb <not-affected> (Vulnerable code introduced later)
[buster] - samba <postponed> (Minor issue, fix along in next DSA)
https://www.samba.org/samba/security/CVE-2020-10730.html
https://bugzilla.samba.org/show_bug.cgi?id=14364
https://git.samba.org/?p=samba.git;a=commitdiff;h=9dd458956d7af1b4bbe505ba2ab72235e81c27d0 (for ldb)

Search for package or bug name: Reporting problems