A vulnerability was found in cyrus-sasl 2.1.27, where off-by-one error was detected in function _sasl_add_string in common.c. Reference: https://github.com/cyrusimap/cyrus-sasl/issues/587 http://www.openldap.org/its/index.cgi/Incoming?id=9123
Analysis: This is essentially an off-by-one, causing a heap OOB read by 1 byte. Arbitrary code execution seems difficult because of the assertions in place, so all it can do is cause remote DoS of the SASL service. Currently there is no upstream patch for this.
Created cyrus-sasl tracking bugs for this issue: Affects: fedora-all [bug 1804034]
FEDORA-2020-51d591d035 has been pushed to the Fedora 32 stable repository. If problem still persists, please make note of it in this bug report.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:4497 https://access.redhat.com/errata/RHSA-2020:4497
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-19906