35 lines
1.5 KiB
Diff
35 lines
1.5 KiB
Diff
|
|
From 1d3fddaac336f84e87ba399388f85734d79ebb95 Mon Sep 17 00:00:00 2001
|
||
|
|
From: Pierre Rogier <progier@redhat.com>
|
||
|
|
Date: Mon, 23 Sep 2024 19:18:52 +0200
|
||
|
|
Subject: [PATCH] Security fix for CVE-2024-8445
|
||
|
|
|
||
|
|
Description:
|
||
|
|
The fix for CVE-2024-2199 in 389-ds-base was insufficient to cover all
|
||
|
|
scenarios. In certain product versions, this issue may allow
|
||
|
|
an authenticated user to cause a server crash while modifying
|
||
|
|
`userPassword` using malformed input.
|
||
|
|
|
||
|
|
References:
|
||
|
|
- https://access.redhat.com/security/cve/CVE-2024-8445
|
||
|
|
- https://nvd.nist.gov/vuln/detail/cve-2024-8445
|
||
|
|
- https://bugzilla.redhat.com/show_bug.cgi?id=2310110
|
||
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2024-2199
|
||
|
|
- https://access.redhat.com/security/cve/CVE-2024-2199
|
||
|
|
- https://bugzilla.redhat.com/show_bug.cgi?id=2267976
|
||
|
|
---
|
||
|
|
ldap/servers/slapd/modify.c | 1 +
|
||
|
|
1 file changed, 1 insertion(+)
|
||
|
|
|
||
|
|
diff --git a/ldap/servers/slapd/modify.c b/ldap/servers/slapd/modify.c
|
||
|
|
index 669bb104ca..2fab346ec3 100644
|
||
|
|
--- a/ldap/servers/slapd/modify.c
|
||
|
|
+++ b/ldap/servers/slapd/modify.c
|
||
|
|
@@ -940,6 +940,7 @@ op_shared_modify(Slapi_PBlock *pb, int pw_change, char *old_pw)
|
||
|
|
send_ldap_result(pb, LDAP_UNWILLING_TO_PERFORM, NULL, "Unable to hash \"userPassword\" attribute, "
|
||
|
|
"check value is utf8 string.\n", 0, NULL);
|
||
|
|
valuearray_free(&va);
|
||
|
|
+ slapi_pblock_set(pb, SLAPI_MODIFY_MODS, (void *)slapi_mods_get_ldapmods_passout(&smods));
|
||
|
|
goto free_and_return;
|
||
|
|
}
|
||
|
|
|