First published: Sun Feb 14 2021(Updated: )
In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to schema_init.c and checkTime.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openldap | 2.4.47+dfsg-3+deb10u7 2.4.57+dfsg-3+deb11u1 2.5.13+dfsg-5 | |
OpenLDAP OpenLDAP | <=2.4.57 | |
OpenLDAP OpenLDAP | =2.5.0-alpha | |
OpenLDAP OpenLDAP | =2.5.1-alpha | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27212 is a vulnerability in OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha that can lead to a denial of service via a crafted packet.
CVE-2021-27212 has a severity rating of 7.5 (high).
OpenLDAP versions 2.4.57 and 2.5.x through 2.5.1alpha are affected by CVE-2021-27212.
To fix CVE-2021-27212, you should upgrade to OpenLDAP version 2.4.58 or 2.5.2 (or a later stable release).
You can find more information about CVE-2021-27212 on the OpenLDAP bug tracker and the corresponding Git commits.