A heap overflow flaw was found in 389-ds-base. This issue leads to a denial of service when writing a value larger than 256 chars in log_entry_attr.
Workaround:
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:1074 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1372 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:3047 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4209 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4633 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:5690 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:7458 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:1632 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2024-1062 | vdb entry vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2256711 | vendor advisory issue tracking |
https://bugzilla.redhat.com/show_bug.cgi?id=2261879 | vendor advisory issue tracking |