Control: retitle -1 trixie-pu: package 389-ds-base/3.1.2+dfsg1-1+deb13u1

On Wed, May 06, 2026 at 11:12:42AM +0300, Adrian Bunk wrote:
> Package: release.debian.org
> Severity: normal
> Tags: trixie moreinfo
> X-Debbugs-Cc: [email protected], [email protected]
> Control: affects -1 + src:389-ds-base
> User: [email protected]
> Usertags: pu
> 
>   * Fix CVE-2025-14905. (Closes: #1130910)
> 
> Tagged moreinfo, as question to the security team whether they want
> this in pu or as DSA.

This is the same as the previous debdiff, except for the corrected 
version number.

cu
Adrian
diffstat for 389-ds-base-3.1.2+dfsg1 389-ds-base-3.1.2+dfsg1

 changelog                                          |    9 ++
 patches/0001-Security-fix-for-CVE-2025-14905.patch |   93 +++++++++++++++++++++
 patches/series                                     |    1 
 3 files changed, 103 insertions(+)

diff -Nru 389-ds-base-3.1.2+dfsg1/debian/changelog 
389-ds-base-3.1.2+dfsg1/debian/changelog
--- 389-ds-base-3.1.2+dfsg1/debian/changelog    2025-04-10 14:06:13.000000000 
+0300
+++ 389-ds-base-3.1.2+dfsg1/debian/changelog    2026-05-05 10:09:43.000000000 
+0300
@@ -1,3 +1,12 @@
+389-ds-base (3.1.2+dfsg1-1+deb13u1) trixie; urgency=medium
+
+  * Non-maintainer upload.
+
+  [ Timo Aaltonen ]
+  * patches: Fix CVE-2025-14905. (Closes: #1130910)
+
+ -- Adrian Bunk <[email protected]>  Tue, 05 May 2026 10:09:43 +0300
+
 389-ds-base (3.1.2+dfsg1-1) unstable; urgency=medium
 
   * New upstream release.
diff -Nru 
389-ds-base-3.1.2+dfsg1/debian/patches/0001-Security-fix-for-CVE-2025-14905.patch
 
389-ds-base-3.1.2+dfsg1/debian/patches/0001-Security-fix-for-CVE-2025-14905.patch
--- 
389-ds-base-3.1.2+dfsg1/debian/patches/0001-Security-fix-for-CVE-2025-14905.patch
   1970-01-01 02:00:00.000000000 +0200
+++ 
389-ds-base-3.1.2+dfsg1/debian/patches/0001-Security-fix-for-CVE-2025-14905.patch
   2026-05-05 10:08:45.000000000 +0300
@@ -0,0 +1,93 @@
+From e2562f5894dd05a3b062e7820f471f2f8e12b85d Mon Sep 17 00:00:00 2001
+From: tbordaz <[email protected]>
+Date: Wed, 25 Feb 2026 14:06:42 +0100
+Subject: [PATCH] Security fix for CVE-2025-14905
+
+Description:
+       A vulnerability was found in the 389 Directory Server.
+       The 389 Directory Server present a risk of heap buffer overflow that
+       can be exploited to excute a Denial of Service and potential Remote
+       Code Execution
+
+References:
+    - https://access.redhat.com/security/cve/CVE-2025-14905
+    - https://bugzilla.redhat.com/show_bug.cgi?id=2423624
+---
+ ldap/servers/slapd/schema.c | 47 ++++++++++++++++++++++++++++++-------
+ 1 file changed, 38 insertions(+), 9 deletions(-)
+
+diff --git a/ldap/servers/slapd/schema.c b/ldap/servers/slapd/schema.c
+index 9ef4ee4bf..7712a720d 100644
+--- a/ldap/servers/slapd/schema.c
++++ b/ldap/servers/slapd/schema.c
+@@ -1410,6 +1410,7 @@ schema_attr_enum_callback(struct asyntaxinfo *asip, void 
*arg)
+     const char *attr_desc, *syntaxoid;
+     char *outp, syntaxlengthbuf[128];
+     int i;
++    int nb_aliases = 0;
+ 
+     vals[0] = &val;
+ 
+@@ -1435,6 +1436,7 @@ schema_attr_enum_callback(struct asyntaxinfo *asip, void 
*arg)
+     if (asip->asi_aliases != NULL) {
+         for (i = 0; asip->asi_aliases[i] != NULL; ++i) {
+             aliaslen += strlen(asip->asi_aliases[i]);
++            nb_aliases++;
+         }
+     }
+ 
+@@ -1452,15 +1454,42 @@ schema_attr_enum_callback(struct asyntaxinfo *asip, 
void *arg)
+      * XXX: 256 is a magic number... it must be big enough to account for
+      * all of the fixed sized items we output.
+      */
+-    sizedbuffer_allocate(aew->psbAttrTypes, 256 + strlen(asip->asi_oid) +
+-                                                strlen(asip->asi_name) +
+-                                                aliaslen + 
strlen_null_ok(attr_desc) +
+-                                                strlen(syntaxoid) +
+-                                                
strlen_null_ok(asip->asi_superior) +
+-                                                
strlen_null_ok(asip->asi_mr_equality) +
+-                                                
strlen_null_ok(asip->asi_mr_ordering) +
+-                                                
strlen_null_ok(asip->asi_mr_substring) +
+-                                                strcat_extensions(NULL, 
asip->asi_extensions));
++    {
++        int asi_oid_strlen = strlen(asip->asi_oid) + 8;      /* "( %s NAME " 
*/
++        int asi_name_strlen = strlen(asip->asi_name) + 6;    /* "( '%s' ...)" 
*/
++        int asi_aliases_strlen = aliaslen + nb_aliases * 3;  /* "'%s' " */
++        int asi_desc_strlen = strlen_null_ok(attr_desc) + 7; /* "DESC '%s'" */
++        int asi_syntaxoid_strlen = strlen("SYNTAX ") + strlen(syntaxoid) + 
strlen(syntaxlengthbuf);
++        int asi_superior_strlen = strlen("SUP ") + 
strlen_null_ok(asip->asi_superior);
++        int asi_mr_equality_strlen = strlen("EQUALITY ") + 
strlen_null_ok(asip->asi_mr_equality);
++        int asi_mr_ordering_strlen = strlen("ORDERING ") + 
strlen_null_ok(asip->asi_mr_ordering);
++        int asi_mr_substring_strlen = strlen("SUBSTR ") + 
strlen_null_ok(asip->asi_mr_substring);
++        int asi_flags_strlen = strlen("SINGLE-VALUE ") +
++                               strlen(schema_obsolete_with_spaces) +
++                               strlen(schema_collective_with_spaces) +
++                               strlen(schema_nousermod_with_spaces) +
++                               strlen("USAGE distributedOperation ") +
++                               strlen("USAGE dSAOperation ") +
++                               strlen("USAGE directoryOperation ");
++        int asi_extension_strlen = strcat_extensions(NULL, 
asip->asi_extensions);
++
++        if (aew->enquote_sup_oc) {
++            /* it enquote the syntax oid */
++            asi_syntaxoid_strlen += 2;
++        }
++
++    sizedbuffer_allocate(aew->psbAttrTypes, 256 + asi_oid_strlen +
++                                                  asi_name_strlen +
++                                                  asi_aliases_strlen +
++                                                  asi_desc_strlen +
++                                                  asi_syntaxoid_strlen +
++                                                  asi_superior_strlen +
++                                                  asi_mr_equality_strlen +
++                                                  asi_mr_ordering_strlen +
++                                                  asi_mr_substring_strlen +
++                                                  asi_extension_strlen +
++                                                  asi_flags_strlen);
++    }
+ 
+     /*
+      * Overall strategy is to maintain a pointer to the next location in
+-- 
+2.53.0
+
diff -Nru 389-ds-base-3.1.2+dfsg1/debian/patches/series 
389-ds-base-3.1.2+dfsg1/debian/patches/series
--- 389-ds-base-3.1.2+dfsg1/debian/patches/series       2025-04-10 
13:56:01.000000000 +0300
+++ 389-ds-base-3.1.2+dfsg1/debian/patches/series       2026-05-05 
10:08:58.000000000 +0300
@@ -3,3 +3,4 @@
 allow-newer-crates.diff
 base64.diff
 0001-Security-fix-for-CVE-2025-2487.patch
+0001-Security-fix-for-CVE-2025-14905.patch

Reply via email to