https://bugs.openldap.org/show_bug.cgi?id=10421
--- Comment #3 from Howard Chu <[email protected]> --- A CVE has been issued for this bug https://www.cve.org/CVERecord?id=CVE-2026-22185 We have disputed the validity of this report. The bug does not cause a denial of service condition. The bug does not reliably cause mdb_load to crash. Even on an unpatched mdb_load, the invalid input is flagged and the mdb_load utility exits cleanly with an error message, there is no crash on any of the supported platforms using various C compilers, optimization flags, and the standard libc malloc library. It is only when using a diagnostic library (e.g. Efence, or compiling with ASAN) that a fault or assert is triggered. The behavior both with and without the fix is the same: the mdb_load utility prints an error message and exits. The reporter argues that even though mdb_load is a one-shot commandline utility, it can be considered a denial of service if the tool is used in automated scripts. But that's a bogus argument, since the utility would exit with an error anyway, when fed invalid input. The actual security exposure is in whatever system processes allowed an invalid input file to be created and fed to the tool. -- You are receiving this mail because: You are on the CC list for the issue.
