CVE-2020-25692

NameCVE-2020-25692
DescriptionA NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during a request for renaming RDNs. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a Denial of Service.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2425-1, DSA-4782-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openldap (PTS)buster, buster (security)2.4.47+dfsg-3+deb10u7fixed
bullseye (security), bullseye2.4.57+dfsg-3+deb11u1fixed
trixie, bookworm2.5.13+dfsg-5fixed
sid2.5.17+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
openldapsourcestretch2.4.44+dfsg-5+deb9u5DLA-2425-1
openldapsourcebuster2.4.47+dfsg-3+deb10u3DSA-4782-1
openldapsource(unstable)2.4.55+dfsg-1

Notes

https://bugs.openldap.org/show_bug.cgi?id=9370
https://git.openldap.org/openldap/openldap/-/commit/4c774220a752bf8e3284984890dc0931fe73165d

Search for package or bug name: Reporting problems