Bug 1894567 (CVE-2020-25692)
Summary: | CVE-2020-25692 openldap: NULL pointer dereference for unauthenticated packet in slapd | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aboyko, apeddire, asoldano, atangrin, bbaranow, bmaxwell, brian.stansberry, cbuissar, cdewolf, chazlett, csutherl, darran.lofthouse, dkreling, dosoudil, eleandro, gzaronik, iweiss, jawilson, jclere, jochrist, jperkins, jwon, krathod, kwills, lgao, matushonek, mbabacek, mharmsen, msalle, msochure, msvehla, mturk, myarboro, nwallace, pjindal, pmackay, rguimara, rmeggins, rstancel, rsvoboda, scorneli, smaestri, spichugi, tom.jenkinson, vashirov, weli |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | Flags: | spichugi:
needinfo-
|
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | openldap 2.4.55 | Doc Type: | If docs needed, set a value |
Doc Text: |
A NULL pointer dereference flaw was found in the OpenLDAP server, during a request for renaming RDNs. This flaw allows a remote, unauthenticated attacker to crash the slapd process by sending a specially crafted request, causing a denial of service. The highest threat from this vulnerability is to system availability.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-04-27 16:46:34 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1895288, 1895328 | ||
Bug Blocks: | 1894568 |
Description
Guilherme de Almeida Suckevicz
2020-11-04 14:09:18 UTC
Created openldap tracking bugs for this issue: Affects: fedora-all [bug 1895288] Upstream fixes: Main branch : https://git.openldap.org/openldap/openldap/-/commit/6abfd60078af02d56edb3b6897692cdd09a08971 https://git.openldap.org/openldap/openldap/-/commit/a08a2db4063f54a6217a0f091aebd02f8bdb482e 2.4 branch : https://git.openldap.org/openldap/openldap/-/commit/4c774220a752bf8e3284984890dc0931fe73165d Statement: This vulnerability affects the server side only. As a result, OpenLDAP client components, such as the component shipped in Red Hat Enterprise Linux 8, are not affected by this flaw. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2021:1389 https://access.redhat.com/errata/RHSA-2021:1389 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-25692 |