Red Hat Bugzilla – Bug 1623247
CVE-2018-14624 389-ds-base: Server crash through modify command with large DN [rhel-7.5.z]
Last modified: 2018-09-25 15:06:54 EDT
This bug has been copied from bug #1614820 and has been proposed to be backported to 7.5 z-stream (EUS).
*** Bug 1623721 has been marked as a duplicate of this bug. ***
Build tested: 389-ds-base-1.3.7.5-27.el7_5.x86_64 Reproducer from https://bugzilla.redhat.com/show_bug.cgi?id=1614820#c7 no longer crashes the server, error messages are formatted correctly: [30/Aug/2018:08:43:15.953873158 -0400] - EMERG - Insufficent buffer capacity to fit timestamp and message! [30/Aug/2018:08:43:16.087007955 -0400] - EMERG - Insufficent buffer capacity to fit timestamp and message! [30/Aug/2018:08:43:16.113006138 -0400] - EMERG - Insufficent buffer capacity to fit timestamp and message! [30/Aug/2018:08:43:16.145550284 -0400] - EMERG - Insufficent buffer capacity to fit timestamp and message! Marking as VERIFIED.
A change was made (new impact, public date, or CSAw status) to the security issue(s) blocked by this tracker, resulting in a new SLA deadline. This bug must now be resolved by 31-Aug-2019. Refer to this bug's Description for information about how to resolve this bug.
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2018:2757