Security fix for CVE-2024-8445
authorPierre Rogier <progier@redhat.com>
Mon, 23 Sep 2024 17:18:52 +0000 (19:18 +0200)
committerAndrej Shadura <andrewsh@debian.org>
Thu, 16 Jan 2025 16:16:37 +0000 (17:16 +0100)
commit218dc878921027cddf766d5b67f52d87238e8032
treed51cbf29ee1f094498e388147d8bd6c221462d0a
parent8b0dad8f16cfe84a339b6809adf193625b013e06
Security fix for CVE-2024-8445

Description:
The fix for CVE-2024-2199 in 389-ds-base was insufficient to cover all
scenarios. In certain product versions, this issue may allow
an authenticated user to cause a server crash while modifying
`userPassword` using malformed input.

References:
- https://access.redhat.com/security/cve/CVE-2024-8445
- https://nvd.nist.gov/vuln/detail/cve-2024-8445
- https://bugzilla.redhat.com/show_bug.cgi?id=2310110
- https://nvd.nist.gov/vuln/detail/CVE-2024-2199
- https://access.redhat.com/security/cve/CVE-2024-2199
- https://bugzilla.redhat.com/show_bug.cgi?id=2267976

Gbp-Pq: Name CVE-2024-8445.patch
ldap/servers/slapd/modify.c