Security fix for CVE-2024-2199
Description:
A denial of service vulnerability was found in the 389 Directory Server.
This issue may allow an authenticated user to cause a server crash while
modifying userPassword using malformed input.
Fix Description:
When doing a mod on userPassword we reset the pblock modifier after we
set the modified timestamp, ensuring the pblock data stays valid.
References:
- https://nvd.nist.gov/vuln/detail/CVE-2024-2199
- https://access.redhat.com/security/cve/CVE-2024-2199
- https://bugzilla.redhat.com/show_bug.cgi?id=
2267976
Gbp-Pq: Name CVE-2024-2199.patch
389-ds-base (2.3.1+dfsg1-1+deb12u1) bookworm; urgency=high
* Non-maintainer upload.
* Apply security patches from the upstream:
- CVE-2024-2199 and CVE-2024-8445: Crash when modifying userPassword
using malformed input (Closes: #
1072531, #
1082852).
- CVE-2024-5953: Denial of service while attempting to log in with
a user with a malformed hash in their password.
- CVE-2024-3657: Failure on the directory server with specially-crafted
LDAP query leading to denial of service.
[dgit import unpatched 389-ds-base 2.3.1+dfsg1-1+deb12u1]