Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 833631 (CVE-2021-4091) - net-nds/389-ds-base: double free in persistent searches
Summary: net-nds/389-ds-base: double free in persistent searches
Status: CONFIRMED
Alias: CVE-2021-4091
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: ~3 [ebuild]
Keywords: PullRequest
Depends on:
Blocks:
 
Reported: 2022-02-18 22:54 UTC by John Helmert III
Modified: 2022-04-11 17:18 UTC (History)
4 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-02-18 22:54:29 UTC
CVE-2021-4091:

A double-free was found in the way 389-ds-base handles virtual attributes context in persistent searches. An attacker could send a series of search requests, forcing the server to behave unexpectedly, and crash.
Comment 1 Larry the Git Cow gentoo-dev 2022-03-18 17:07:39 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=d3a117fa888af153270d1b76f82a5db166768cb1

commit d3a117fa888af153270d1b76f82a5db166768cb1
Author:     Dennis Lamm <expeditioneer@gentoo.org>
AuthorDate: 2022-03-18 10:40:47 +0000
Commit:     Dennis Lamm <expeditioneer@gentoo.org>
CommitDate: 2022-03-18 17:07:32 +0000

    net-nds/389-ds-base 2.1.0 version bump
    
    Closes: https://bugs.gentoo.org/832900
    Bug: https://bugs.gentoo.org/833631
    
    Signed-off-by: Dennis Lamm <expeditioneer@gentoo.org>

 net-nds/389-ds-base/389-ds-base-2.1.0.ebuild | 324 +++++++++++++++++++++++++++
 net-nds/389-ds-base/Manifest                 |   1 +
 net-nds/389-ds-base/metadata.xml             |   2 +
 3 files changed, 327 insertions(+)
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-03-19 05:38:17 UTC
(In reply to Larry the Git Cow from comment #1)
> The bug has been referenced in the following commit(s):
> 
> https://gitweb.gentoo.org/repo/gentoo.git/commit/
> ?id=d3a117fa888af153270d1b76f82a5db166768cb1
> 
> commit d3a117fa888af153270d1b76f82a5db166768cb1
> Author:     Dennis Lamm <expeditioneer@gentoo.org>
> AuthorDate: 2022-03-18 10:40:47 +0000
> Commit:     Dennis Lamm <expeditioneer@gentoo.org>
> CommitDate: 2022-03-18 17:07:32 +0000
> 
>     net-nds/389-ds-base 2.1.0 version bump
>     
>     Closes: https://bugs.gentoo.org/832900
>     Bug: https://bugs.gentoo.org/833631
>     
>     Signed-off-by: Dennis Lamm <expeditioneer@gentoo.org>
> 
>  net-nds/389-ds-base/389-ds-base-2.1.0.ebuild | 324
> +++++++++++++++++++++++++++
>  net-nds/389-ds-base/Manifest                 |   1 +
>  net-nds/389-ds-base/metadata.xml             |   2 +
>  3 files changed, 327 insertions(+)

Do we know if this fixes this vulnerability?
Comment 3 Dennis Lamm gentoo-dev 2022-04-06 06:50:25 UTC
Hi John,

Upstream Issue: https://github.com/389ds/389-ds-base/issues/5218

Is merged in 2.1.0 branch.
Comment 4 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-04-09 13:38:54 UTC
I'm not sure how you get that. The linked fix commit seems to be in 2.2.0:

~/git/389-ds-base $ git tag --contains a3c298f
389-ds-base-2.2.0
Comment 5 Dennis Lamm gentoo-dev 2022-04-11 17:18:46 UTC
Sorry my bad. I thought that https://github.com/389ds/389-ds-base/commit/00385645f4fb103ca0107777398347fe7478d377 was merged to 2.1.0. But it was on the 2.1.0 branch.
Therefore it will be fixed with a version bump to 2.1.1 or 2.2.0.