In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to schema_init.c and checkTime. References: https://bugs.openldap.org/show_bug.cgi?id=9454 https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0 https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30
Created openldap tracking bugs for this issue: Affects: fedora-all [bug 1928775]
Hello, while doing review of the Vulnerability Assessment report of RHEL 8.6 for the purpose of Common Criteria certification, we came across this CVE-2021-27212. The CVE page https://access.redhat.com/security/cve/cve-2021-27212 lists RHEL 8 as Not affected and RHEL 9 as Affected. It is not clear from that page why that should be the case. Actually, in RHEL 9 bug 1929142 Simon says The issue is in the openldap-servers package which is not present on RHEL 8 and newer. So it seems like both RHEL 8 and 9 should be listed as Not affected, and the Statement should explain that openldap-servers (or slapd) is not shipped there, similar to https://access.redhat.com/security/cve/cve-2022-29155 or https://access.redhat.com/security/cve/cve-2020-25710. Is that a correct conclusion? Thank you, Jan
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-27212