[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 4884-1] ldb security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4884-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
April 02, 2021                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : ldb
CVE ID         : CVE-2020-10730 CVE-2020-27840 CVE-2021-20277
Debian Bug     : 985935 985936

Multiple vulnerabilities have been discovered in ldb, a LDAP-like
embedded database built on top of TDB.

CVE-2020-10730

    Andrew Bartlett discovered a NULL pointer dereference and
    use-after-free flaw when handling 'ASQ' and 'VLV' LDAP controls and
    combinations with the LDAP paged_results feature.

CVE-2020-27840

    Douglas Bagnall discovered a heap corruption flaw via crafted
    DN strings.

CVE-2021-20277

    Douglas Bagnall discovered an out-of-bounds read vulnerability in
    handling LDAP attributes that contains multiple consecutive
    leading spaces.

For the stable distribution (buster), these problems have been fixed in
version 2:1.5.1+really1.4.6-3+deb10u1.

We recommend that you upgrade your ldb packages.

For the detailed security status of ldb please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/ldb

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=arHu
-----END PGP SIGNATURE-----


Reply to: