Skip to content

Commit

Permalink
Security fix for CVE-2024-8445
Browse files Browse the repository at this point in the history
Description:
The fix for CVE-2024-2199 in 389-ds-base was insufficient to cover all
scenarios. In certain product versions, this issue may allow
an authenticated user to cause a server crash while modifying
`userPassword` using malformed input.

References:
- https://access.redhat.com/security/cve/CVE-2024-8445
- https://nvd.nist.gov/vuln/detail/cve-2024-8445
- https://bugzilla.redhat.com/show_bug.cgi?id=2310110
- https://nvd.nist.gov/vuln/detail/CVE-2024-2199
- https://access.redhat.com/security/cve/CVE-2024-2199
- https://bugzilla.redhat.com/show_bug.cgi?id=2267976
  • Loading branch information
progier389 authored and vashirov committed Sep 26, 2024
1 parent 31c0fe6 commit 1d3fdda
Showing 1 changed file with 1 addition and 0 deletions.
1 change: 1 addition & 0 deletions ldap/servers/slapd/modify.c
Original file line number Diff line number Diff line change
Expand Up @@ -940,6 +940,7 @@ op_shared_modify(Slapi_PBlock *pb, int pw_change, char *old_pw)
send_ldap_result(pb, LDAP_UNWILLING_TO_PERFORM, NULL, "Unable to hash \"userPassword\" attribute, "
"check value is utf8 string.\n", 0, NULL);
valuearray_free(&va);
slapi_pblock_set(pb, SLAPI_MODIFY_MODS, (void *)slapi_mods_get_ldapmods_passout(&smods));
goto free_and_return;
}

Expand Down

0 comments on commit 1d3fdda

Please sign in to comment.