A heap overflow flaw was found in 389-ds-base. This issue leads to a denial of service when writing a value larger than 256 chars in log_entry_attr.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2024:1074 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2024:1372 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2024:3047 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2024:4209 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2024:4633 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2024:5690 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2024:7458 | Vendor Advisory |
https://access.redhat.com/security/cve/CVE-2024-1062 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2256711 | Issue Tracking Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2261879 | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
|
History
10 Oct 2024, 14:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHSA-2024:1074 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:1372 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:3047 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:4209 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:4633 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:5690 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:7458 - Vendor Advisory | |
References | () https://access.redhat.com/security/cve/CVE-2024-1062 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2256711 - Issue Tracking, Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2261879 - Issue Tracking, Vendor Advisory | |
CPE | cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:41:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:* cpe:2.3:a:redhat:directory_server:12.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.8:*:*:*:*:*:*:* cpe:2.3:o:redhat:389_directory_server:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:* cpe:2.3:a:redhat:directory_server:11.7:*:*:*:*:*:*:* cpe:2.3:a:redhat:directory_server:11.8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:* cpe:2.3:a:redhat:directory_server:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* |
|
First Time |
Redhat enterprise Linux For Ibm Z Systems
Redhat Redhat enterprise Linux Server For Power Little Endian Update Services For Sap Solutions Redhat enterprise Linux For Arm 64 Eus Redhat enterprise Linux For Ibm Z Systems Eus Redhat enterprise Linux Update Services For Sap Solutions Redhat enterprise Linux Fedoraproject Redhat enterprise Linux For Power Little Endian Eus Redhat 389 Directory Server Redhat enterprise Linux Eus Redhat enterprise Linux Server Tus Fedoraproject fedora Redhat enterprise Linux Server Aus Redhat directory Server |
01 Oct 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Aug 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
18 Jul 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 Jul 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 May 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
19 Mar 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Mar 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
12 Feb 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-12 13:15
Updated : 2024-10-10 14:22
NVD link : CVE-2024-1062
Mitre link : CVE-2024-1062
CVE.ORG link : CVE-2024-1062
JSON object : View
Products Affected
fedoraproject
- fedora
redhat
- enterprise_linux_server_tus
- enterprise_linux_for_ibm_z_systems_eus
- enterprise_linux_for_ibm_z_systems
- 389_directory_server
- enterprise_linux_for_arm_64_eus
- enterprise_linux_for_power_little_endian_eus
- enterprise_linux_server_aus
- enterprise_linux_update_services_for_sap_solutions
- enterprise_linux
- enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
- directory_server
- enterprise_linux_eus
CWE
CWE-122
Heap-based Buffer Overflow