A flaw was found in openldap before version 2.4.48. A rootdn for database A can incorrectly assert the identity of any user in database B. References: https://bugzilla.redhat.com/show_bug.cgi?id=1728902
Created openldap tracking bugs for this issue: Affects: fedora-all [bug 1734760]
This vulnerability is out of security support scope for the following product: * Red Hat Enterprise Application Platform 5 * Red Hat JBoss Web Server 2 * Red Hat JBoss Core Services Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.
External References: http://www.openldap.org/lists/openldap-announce/201907/msg00001.html https://openldap.org/its/?findid=9038
Patch: https://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=fbe5611e606e80e56e158cc42f0c7289975836a8 Test related to the patch: https://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=eb5a58487b293358887a2b7f41ea1873abf55fa0 https://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=12f02425890c2d44d5976c0de2ef64726dc56285 https://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=15137bf76fc68f3c97c92ec0d2354d4dd0906348
Mitigation: This is only an issue in e.g. multi-tenant deployments that require isolation of databases. Do not give rootDN privileges to untrusted users.
Statement: This issue affects the versions of openldap as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8. Red Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/. Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.