Description
A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
Problem types
Product status
0:3.1.3-7.el10_1 (rpm) before *
0:2.7.0-10.el9_7 (rpm) before *
Timeline
| 2025-12-18: | Reported to Red Hat. |
| 2026-02-23: | Made public. |
Credits
This issue was discovered by Red Hat Security Research Team (Red Hat Inc.).
References
access.redhat.com/errata/RHSA-2026:3189 (RHSA-2026:3189)
access.redhat.com/errata/RHSA-2026:3208 (RHSA-2026:3208)
access.redhat.com/security/cve/CVE-2025-14905
bugzilla.redhat.com/show_bug.cgi?id=2423624 (RHBZ#2423624)