Reachable Assertion Affecting openldap package, versions <0:2.4.44-25.el7_9
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL7-OPENLDAP-1396705
- published 26 Jul 2021
- disclosed 2 Nov 2020
Introduced: 2 Nov 2020
CVE-2020-25710 Open this link in a new tabHow to fix?
Upgrade RHEL:7 openldap to version 0:2.4.44-25.el7_9 or higher.
This issue was patched in RHSA-2022:0621.
NVD Description
Note: Versions mentioned in the description apply only to the upstream openldap package and not the openldap package as distributed by RHEL.
See How to fix? for RHEL:7 relevant fixed versions and status.
A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability.
References
- https://security.netapp.com/advisory/ntap-20210716-0003/
- https://access.redhat.com/security/cve/CVE-2020-25710
- https://www.debian.org/security/2020/dsa-4792
- https://bugzilla.redhat.com/show_bug.cgi?id=1899678
- https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html
- https://access.redhat.com/errata/RHSA-2022:0621
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E