Bug 1928774 (CVE-2021-27212)

Summary: CVE-2021-27212 openldap: Assertion failure in slapd in the issuerAndThisUpdateCheck function
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: ggasparb, idm-ds-dev-bugs, jpazdziora, kaycoth, lance, matushonek, pmatouse, rmeggins, spichugi, vashirov
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in openldap. An assertion failure in slapd can occur resulting in a denial of service (daemon exit) via a short timestamp. The highest threat from this vulnerability is to system availability.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-08-10 16:08:30 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1928775, 1929142    
Bug Blocks: 1928776    

Description Pedro Sampaio 2021-02-15 14:33:59 UTC
In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to schema_init.c and checkTime.

References:

https://bugs.openldap.org/show_bug.cgi?id=9454
https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0
https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30

Comment 1 Pedro Sampaio 2021-02-15 14:34:31 UTC
Created openldap tracking bugs for this issue:

Affects: fedora-all [bug 1928775]

Comment 5 Jan Pazdziora 2023-07-25 15:09:06 UTC
Hello,

while doing review of the Vulnerability Assessment report of RHEL 8.6 for the purpose of Common Criteria certification, we came across this CVE-2021-27212. The CVE page https://access.redhat.com/security/cve/cve-2021-27212 lists RHEL 8 as Not affected and RHEL 9 as Affected. It is not clear from that page why that should be the case.

Actually, in RHEL 9 bug 1929142 Simon says

  The issue is in the openldap-servers package which is not present on RHEL 8 and newer.

So it seems like both RHEL 8 and 9 should be listed as Not affected, and the Statement should explain that openldap-servers (or slapd) is not shipped there, similar to https://access.redhat.com/security/cve/cve-2022-29155 or https://access.redhat.com/security/cve/cve-2020-25710.

Is that a correct conclusion?

Thank you, Jan

Comment 7 Product Security DevOps Team 2023-08-10 16:08:27 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-27212