Source: 389-ds-base Version: 3.1.2+dfsg1-1 Severity: important Tags: security upstream X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for 389-ds-base. CVE-2025-14905[0]: | A flaw was found in the 389-ds-base server. A heap buffer overflow | vulnerability exists in the `schema_attr_enum_callback` function | within the `schema.c` file. This occurs because the code incorrectly | calculates the buffer size by summing alias string lengths without | accounting for additional formatting characters. When a large number | of aliases are processed, this oversight can lead to a heap | overflow, potentially allowing a remote attacker to cause a Denial | of Service (DoS) or achieve Remote Code Execution (RCE). If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-14905 https://www.cve.org/CVERecord?id=CVE-2025-14905 [1] https://github.com/389ds/389-ds-base/commit/2e424110def2e3998f6045e136fb0d43f47b7f5a Please adjust the affected versions in the BTS as needed. Regards, Salvatore

