https://bugs.openldap.org/show_bug.cgi?id=10421

--- Comment #3 from Howard Chu <[email protected]> ---
A CVE has been issued for this bug
https://www.cve.org/CVERecord?id=CVE-2026-22185

We have disputed the validity of this report. The bug does not cause a denial
of service condition. The bug does not reliably cause mdb_load to crash. Even
on an unpatched mdb_load, the invalid input is flagged and the mdb_load utility
exits cleanly with an error message, there is no crash on any of the supported
platforms using various C compilers, optimization flags, and the standard libc
malloc library. It is only when using a diagnostic library (e.g. Efence, or
compiling with ASAN) that a fault or assert is triggered.

The behavior both with and without the fix is the same: the mdb_load utility
prints an error message and exits.

The reporter argues that even though mdb_load is a one-shot commandline
utility, it can be considered a denial of service if the tool is used in
automated scripts. But that's a bogus argument, since the utility would exit
with an error anyway, when fed invalid input. The actual security exposure is
in whatever system processes allowed an invalid input file to be created and
fed to the tool.

-- 
You are receiving this mail because:
You are on the CC list for the issue.

Reply via email to