DescriptionA NULL pointer dereference, or possible use-after-free flaw was found in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is shipped with the libldb package. This flaw allows an authenticated user to possibly trigger a use-after-free or NULL pointer dereference. The highest threat from this vulnerability is to system availability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ldb (PTS)stretch (security), stretch2:1.1.27-1+deb9u1fixed
bullseye, sid2:2.1.4-2fixed
samba (PTS)stretch (security), stretch2:4.5.16+dfsg-1+deb9u2vulnerable
buster (security)2:4.9.5+dfsg-5+deb10u1vulnerable
bullseye, sid2:4.12.5+dfsg-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ldbsourcestretch(not affected)


[buster] - ldb <no-dsa> (Minor issue)
[buster] - samba <postponed> (Minor issue, fix along in next DSA)
[stretch] - ldb <not-affected> (Vulnerable code introduced later);a=commitdiff;h=9dd458956d7af1b4bbe505ba2ab72235e81c27d0 (for ldb)

Search for package or bug name: Reporting problems