Amazon Linux 2 Security Advisory: ALAS2-2026-3205
Advisory Released Date: 2026-03-19
Advisory Updated Date: 2026-03-19
A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE). (CVE-2025-14905)
Affected Packages:
389-ds-base
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update 389-ds-base or yum update --advisory ALAS2-2026-3205 to update your system.
aarch64:
389-ds-base-1.3.10.2-17.amzn2.0.5.aarch64
389-ds-base-libs-1.3.10.2-17.amzn2.0.5.aarch64
389-ds-base-devel-1.3.10.2-17.amzn2.0.5.aarch64
389-ds-base-snmp-1.3.10.2-17.amzn2.0.5.aarch64
389-ds-base-debuginfo-1.3.10.2-17.amzn2.0.5.aarch64
i686:
389-ds-base-1.3.10.2-17.amzn2.0.5.i686
389-ds-base-libs-1.3.10.2-17.amzn2.0.5.i686
389-ds-base-devel-1.3.10.2-17.amzn2.0.5.i686
389-ds-base-snmp-1.3.10.2-17.amzn2.0.5.i686
389-ds-base-debuginfo-1.3.10.2-17.amzn2.0.5.i686
src:
389-ds-base-1.3.10.2-17.amzn2.0.5.src
x86_64:
389-ds-base-1.3.10.2-17.amzn2.0.5.x86_64
389-ds-base-libs-1.3.10.2-17.amzn2.0.5.x86_64
389-ds-base-devel-1.3.10.2-17.amzn2.0.5.x86_64
389-ds-base-snmp-1.3.10.2-17.amzn2.0.5.x86_64
389-ds-base-debuginfo-1.3.10.2-17.amzn2.0.5.x86_64