Bug 1849489 (CVE-2020-10730)
Summary: | CVE-2020-10730 samba: NULL pointer de-reference and use-after-free in Samba AD DC LDAP Server with ASQ, VLV and paged_results | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Huzaifa S. Sidhpurwala <huzaifas> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | abokovoy, asn, gdeschner, hvyas, iboukris, iboukris, jhrozek, lslebodn, puebele, rhs-smb, security-response-team, sgallagh, ssorce, vbellur |
Target Milestone: | --- | Keywords: | Reopened, Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | samba 4.10.17, samba 4.11.11, samba 4.12.4 | Doc Type: | If docs needed, set a value |
Doc Text: |
A NULL pointer dereference, or possible use-after-free flaw was found in the Samba AD LDAP server. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is shipped with the libldb package. This flaw allows an authenticated user to possibly trigger a use-after-free or NULL pointer dereference. The highest threat from this vulnerability is to system availability.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-07-23 07:27:36 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1849613, 1849615, 1849979, 1853255 | ||
Bug Blocks: | 1849490 |
Description
Huzaifa S. Sidhpurwala
2020-06-22 04:53:01 UTC
Acknowledgments: Name: the Samba project Upstream: Andrew Bartlett Statement: The version of samba shipped with Red Hat Gluster Storage 3 is built with a private copy of ldb which includes the vulnerable code. However, samba shipped with RHGS 3 is not supported for use as an AD DC and hence this issue has been rated as having a security impact of Low. External References: https://www.samba.org/samba/security/CVE-2020-10730.html Created libldb tracking bugs for this issue: Affects: fedora-all [bug 1853255] This issue has been addressed in the following products: Red Hat Gluster Storage 3.5 for RHEL 8 Via RHSA-2020:3119 https://access.redhat.com/errata/RHSA-2020:3119 This issue has been addressed in the following products: Red Hat Gluster Storage 3.5 for RHEL 7 Via RHSA-2020:3118 https://access.redhat.com/errata/RHSA-2020:3118 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-10730 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:4568 https://access.redhat.com/errata/RHSA-2020:4568 |