CVE-2022-29155

NameCVE-2022-29155
DescriptionIn OpenLDAP 2.x before 2.5.12 and 2.6.x before 2.6.2, a SQL injection vulnerability exists in the experimental back-sql backend to slapd, via a SQL statement within an LDAP query. This can occur during an LDAP search operation when the search filter is processed, due to a lack of proper escaping.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3017-1, DSA-5140-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openldap (PTS)bullseye (security), bullseye2.4.57+dfsg-3+deb11u1fixed
bookworm2.5.13+dfsg-5fixed
sid, trixie2.5.18+dfsg-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
openldapsourcestretch2.4.44+dfsg-5+deb9u9DLA-3017-1
openldapsourcebuster2.4.47+dfsg-3+deb10u7DSA-5140-1
openldapsourcebullseye2.4.57+dfsg-3+deb11u1DSA-5140-1
openldapsource(unstable)2.5.12+dfsg-1

Notes

https://bugs.openldap.org/show_bug.cgi?id=9815
https://git.openldap.org/openldap/openldap/-/commit/87df6c19915042430540931d199a39105544a134 (master)
https://git.openldap.org/openldap/openldap/-/commit/40f3ae4f5c9a8baf75b237220f62c436a571d66e (OPENLDAP_REL_ENG_2_5_12)
back-sql backend to slapd is enabled but considered experimental upstream.

Search for package or bug name: Reporting problems