A heap overflow flaw was found in 389-ds-base. This issue leads to a denial of service when writing a value larger than 256 chars in log_entry_attr.
CVSS
No CVSS.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
|
History
18 Feb 2025, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
CWE |
10 Oct 2024, 14:22
Type | Values Removed | Values Added |
---|---|---|
First Time |
Redhat 389 Directory Server
Redhat enterprise Linux For Arm 64 Eus Fedoraproject Redhat enterprise Linux Update Services For Sap Solutions Redhat enterprise Linux For Power Little Endian Eus Redhat enterprise Linux Server Aus Fedoraproject fedora Redhat directory Server Redhat enterprise Linux For Ibm Z Systems Redhat enterprise Linux Eus Redhat enterprise Linux Server For Power Little Endian Update Services For Sap Solutions Redhat enterprise Linux Server Tus Redhat enterprise Linux Redhat Redhat enterprise Linux For Ibm Z Systems Eus |
|
References | () https://access.redhat.com/errata/RHSA-2024:4209 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:1372 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:5690 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:7458 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2261879 - Issue Tracking, Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:3047 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:1074 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2256711 - Issue Tracking, Vendor Advisory | |
References | () https://access.redhat.com/security/cve/CVE-2024-1062 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:4633 - Vendor Advisory | |
CPE | cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:* cpe:2.3:a:redhat:directory_server:12.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:41:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:* cpe:2.3:a:redhat:directory_server:11.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8:*:*:*:*:*:*:* cpe:2.3:a:redhat:directory_server:11.8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8:*:*:*:*:*:*:* cpe:2.3:a:redhat:directory_server:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:389_directory_server:*:*:*:*:*:*:*:* |
01 Oct 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Aug 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
18 Jul 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 Jul 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 May 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
19 Mar 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Mar 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Feb 2024, 14:19
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-12 13:15
Updated : 2025-02-18 11:15
NVD link : CVE-2024-1062
Mitre link : CVE-2024-1062
JSON object : View
Products Affected
redhat
- 389_directory_server
- enterprise_linux_server_aus
- enterprise_linux
- enterprise_linux_server_tus
- enterprise_linux_for_power_little_endian_eus
- enterprise_linux_update_services_for_sap_solutions
- enterprise_linux_for_ibm_z_systems_eus
- enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
- enterprise_linux_eus
- enterprise_linux_for_arm_64_eus
- directory_server
- enterprise_linux_for_ibm_z_systems
fedoraproject
- fedora
CWE
No CWE.