A vulnerability was found in the ds-389-base server, specifically in the schema.c file which was then verified as exploitable in the running server. There is a heap buffer overflow that can be exploited to execute a DoS and potential RCE. The vulnerability is possible through the function schema_attr_enum_callback, the code calculates size by summing the lengths of alias strings but fails to account for the formatting characters added during printing. It relies on a static "magic number" of 256 to absorb this overhead. When the number of aliases is large enough, the cumulative overhead of 3 bytes per alias exceeds the 256-byte margin, leading to a heap overflow.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2026:3189 https://access.redhat.com/errata/RHSA-2026:3189
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2026:3208 https://access.redhat.com/errata/RHSA-2026:3208
This issue has been addressed in the following products: Red Hat Enterprise Linux 10.0 Extended Update Support Via RHSA-2026:3504 https://access.redhat.com/errata/RHSA-2026:3504
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.6 Extended Update Support Via RHSA-2026:4207 https://access.redhat.com/errata/RHSA-2026:4207
This issue has been addressed in the following products: Red Hat Directory Server 12.4 EUS for RHEL 9 Via RHSA-2026:4661 https://access.redhat.com/errata/RHSA-2026:4661
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2026:4720 https://access.redhat.com/errata/RHSA-2026:4720
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Via RHSA-2026:5196 https://access.redhat.com/errata/RHSA-2026:5196
This issue has been addressed in the following products: Red Hat Directory Server 11.5 E4S for RHEL 8 Via RHSA-2026:5512 https://access.redhat.com/errata/RHSA-2026:5512
This issue has been addressed in the following products: Red Hat Directory Server 11.9 for RHEL 8 Via RHSA-2026:5514 https://access.redhat.com/errata/RHSA-2026:5514
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2026:5511 https://access.redhat.com/errata/RHSA-2026:5511
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:5513 https://access.redhat.com/errata/RHSA-2026:5513
This issue has been addressed in the following products: Red Hat Directory Server 11.7 E4S for RHEL 8 Via RHSA-2026:5568 https://access.redhat.com/errata/RHSA-2026:5568
This issue has been addressed in the following products: Red Hat Directory Server 12.2 E4S for RHEL 9 Via RHSA-2026:5569 https://access.redhat.com/errata/RHSA-2026:5569
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions Red Hat Enterprise Linux 8.8 Telecommunications Update Service Via RHSA-2026:5576 https://access.redhat.com/errata/RHSA-2026:5576
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2026:5597 https://access.redhat.com/errata/RHSA-2026:5597
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions Via RHSA-2026:5598 https://access.redhat.com/errata/RHSA-2026:5598
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Extended Lifecycle Support Via RHSA-2026:6220 https://access.redhat.com/errata/RHSA-2026:6220
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On Via RHSA-2026:6268 https://access.redhat.com/errata/RHSA-2026:6268