A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
https://access.redhat.com/errata/RHSA-2026:5598
https://access.redhat.com/errata/RHSA-2026:5597
https://access.redhat.com/errata/RHSA-2026:5576
https://access.redhat.com/errata/RHSA-2026:5569
https://access.redhat.com/errata/RHSA-2026:5568
https://access.redhat.com/errata/RHSA-2026:5514
https://access.redhat.com/errata/RHSA-2026:5513
https://access.redhat.com/errata/RHSA-2026:5512
https://access.redhat.com/errata/RHSA-2026:5511
https://access.redhat.com/errata/RHSA-2026:5196
https://access.redhat.com/errata/RHSA-2026:4720
https://access.redhat.com/errata/RHSA-2026:4661
https://access.redhat.com/errata/RHSA-2026:4207
https://access.redhat.com/errata/RHSA-2026:3504
https://access.redhat.com/errata/RHSA-2026:3379