ALAS2-2026-3205


Amazon Linux 2 Security Advisory: ALAS2-2026-3205
Advisory Released Date: 2026-03-19
Advisory Updated Date: 2026-03-19
Severity: Important

Issue Overview:

A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE). (CVE-2025-14905)


Affected Packages:

389-ds-base


Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update 389-ds-base or yum update --advisory ALAS2-2026-3205 to update your system.

New Packages:
aarch64:
    389-ds-base-1.3.10.2-17.amzn2.0.5.aarch64
    389-ds-base-libs-1.3.10.2-17.amzn2.0.5.aarch64
    389-ds-base-devel-1.3.10.2-17.amzn2.0.5.aarch64
    389-ds-base-snmp-1.3.10.2-17.amzn2.0.5.aarch64
    389-ds-base-debuginfo-1.3.10.2-17.amzn2.0.5.aarch64

i686:
    389-ds-base-1.3.10.2-17.amzn2.0.5.i686
    389-ds-base-libs-1.3.10.2-17.amzn2.0.5.i686
    389-ds-base-devel-1.3.10.2-17.amzn2.0.5.i686
    389-ds-base-snmp-1.3.10.2-17.amzn2.0.5.i686
    389-ds-base-debuginfo-1.3.10.2-17.amzn2.0.5.i686

src:
    389-ds-base-1.3.10.2-17.amzn2.0.5.src

x86_64:
    389-ds-base-1.3.10.2-17.amzn2.0.5.x86_64
    389-ds-base-libs-1.3.10.2-17.amzn2.0.5.x86_64
    389-ds-base-devel-1.3.10.2-17.amzn2.0.5.x86_64
    389-ds-base-snmp-1.3.10.2-17.amzn2.0.5.x86_64
    389-ds-base-debuginfo-1.3.10.2-17.amzn2.0.5.x86_64