DEBIAN-CVE-2021-46823

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2021-46823
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2021-46823.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2021-46823
Upstream
Published
2022-06-18T16:15:08Z
Modified
2025-09-19T06:04:26Z
Summary
[none]
Details

python-ldap before 3.4.0 is vulnerable to a denial of service when ldap.schema is used for untrusted schema definitions, because of a regular expression denial of service (ReDoS) flaw in the LDAP schema parser. By sending crafted regex input, a remote authenticated attacker could exploit this vulnerability to cause a denial of service condition.

References

Affected packages

Debian:12 / python-ldap

Package

Name
python-ldap
Purl
pkg:deb/debian/python-ldap?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.4.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / python-ldap

Package

Name
python-ldap
Purl
pkg:deb/debian/python-ldap?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.4.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / python-ldap

Package

Name
python-ldap
Purl
pkg:deb/debian/python-ldap?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.4.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}