A double-free was found in the way 389-ds-base handles virtual attributes context in persistent searches. An attacker could send a series of search requests, forcing the server to behave unexpectedly, and crash.
The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.
Name | Vendor | Start Version | End Version |
---|---|---|---|
389-ds-base | Port389 | * | 1.3.10.2 (excluding) |
Red Hat Directory Server 11.3 for RHEL 8 | RedHat | redhat-ds:11-8040020220114174559.d9abee45 | * |
Red Hat Enterprise Linux 7 | RedHat | 389-ds-base-0:1.3.10.2-15.el7_9 | * |
Red Hat Enterprise Linux 8 | RedHat | 389-ds:1.4-8050020220302180105.4051e825 | * |
Red Hat Enterprise Linux 8.4 Extended Update Support | RedHat | 389-ds:1.4-8040020220323173247.96015a92 | * |
389-ds-base | Ubuntu | bionic | * |
389-ds-base | Ubuntu | impish | * |
389-ds-base | Ubuntu | kinetic | * |
389-ds-base | Ubuntu | lunar | * |
389-ds-base | Ubuntu | mantic | * |
389-ds-base | Ubuntu | trusty | * |
389-ds-base | Ubuntu | xenial | * |