Bug 921719 (CVE-2014-9488) - VUL-1: CVE-2014-9488: less: out of bounds read acces with invalid UTF-8
Summary: VUL-1: CVE-2014-9488: less: out of bounds read acces with invalid UTF-8
Status: RESOLVED FIXED
Alias: CVE-2014-9488
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Minor
Target Milestone: ---
Deadline: 2019-05-24
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/114590/
Whiteboard: CVSSv2:SUSE:OSS:2015/Q1/797:1.9:(AV:L...
Keywords:
Depends on:
Blocks:
 
Reported: 2015-03-11 10:56 UTC by Andreas Stieger
Modified: 2021-08-31 07:23 UTC (History)
7 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
patch extracted from https://blog.fuzzing-project.org/3-less-out-of-bounds-read-access-TFPA-0022014.html (432 bytes, patch)
2015-03-11 10:56 UTC, Andreas Stieger
Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Andreas Stieger 2015-03-11 10:56:57 UTC
Created attachment 626307 [details]
patch extracted from https://blog.fuzzing-project.org/3-less-out-of-bounds-read-access-TFPA-0022014.html

via OSS:2015/Q1/797
https://blog.fuzzing-project.org/3-less-out-of-bounds-read-access-TFPA-0022014.html
Hanno Böck reported:

> less out of bounds read access - TFPA 002/2014
>
> An out of bounds read access in the UTF-8 decoding can be triggered with a malformed
> file in the tool less. The access happens in the function is_utf8_well_formed (charset.c,
> line 534) due to a truncated multibyte character in the sample file. It affects the latest
> upstream less version 470. The bug does not crash less, it can only be made visible by
> running less with valgrind or compiling it with Address Sanitizer. The security impact is
> likely minor as it is only an invalid read access.
> 
> This issue has been found with the help of Address Sanitizer.
[...]
> Update 2015-03-10: Version 475 of less contains a fix for this issue.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9488
http://seclists.org/oss-sec/2015/q1/797
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9488
Comment 1 Swamp Workflow Management 2015-03-11 23:00:22 UTC
bugbot adjusting priority
Comment 2 Kristyna Streitova 2015-03-16 13:10:38 UTC
|    Product    | Version | Affected | Request |
|---------------|---------|----------|---------|
| SLE11         | 424b    | yes      | wait    |
| SLE12         | 458     | yes      | wait    |
| openSUSE 13.1 | 458     | yes      | #290996 |
| openSUSE 13.2 | 458     | yes      | #290996 |
| Factory       | 458     | yes      | #290992 |

The affected row from the patch is in all our products. The fix was submitted to openSUSE and Factory. 
I'm reassigning it back to security-team until the submissions for SLE are needed.
Comment 3 Bernhard Wiedemann 2015-03-16 14:00:17 UTC
This is an autogenerated message for OBS integration:
This bug (921719) was mentioned in
https://build.opensuse.org/request/show/290996 13.2+13.1 / less
Comment 4 Swamp Workflow Management 2015-03-25 09:04:58 UTC
openSUSE-SU-2015:0595-1: An update that fixes one vulnerability is now available.

Category: security (low)
Bug References: 921719
CVE References: CVE-2014-9488
Sources used:
openSUSE 13.2 (src):    less-458-6.4.1
openSUSE 13.1 (src):    less-458-2.8.1
Comment 5 Forgotten User 1yPKgLkz9g 2015-04-20 05:05:59 UTC
(In reply to Andreas Stieger from comment #0)
> Created attachment 626307 [details]
> patch extracted from
> https://blog.fuzzing-project.org/3-less-out-of-bounds-read-access-TFPA-
> 0022014.html
> 
> via OSS:2015/Q1/797
> https://blog.fuzzing-project.org/3-less-out-of-bounds-read-access-TFPA-
> 0022014.html
> Hanno Böck reported:
> 
> > less out of bounds read access - TFPA 002/2014
> >
> > An out of bounds read access in the UTF-8 decoding can be triggered with a malformed
> > file in the tool less. The access happens in the function is_utf8_well_formed (charset.c,
> > line 534) due to a truncated multibyte character in the sample file. It affects the latest
> > upstream less version 470. The bug does not crash less, it can only be made visible by
> > running less with valgrind or compiling it with Address Sanitizer. The security impact is
> > likely minor as it is only an invalid read access.
> > 
> > This issue has been found with the help of Address Sanitizer.
> [...]
> > Update 2015-03-10: Version 475 of less contains a fix for this issue.
> 
> References:
> http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9488
> http://seclists.org/oss-sec/2015/q1/797
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9488

Does this patch work?
Comment 8 Swamp Workflow Management 2019-04-26 15:16:17 UTC
An update workflow for this issue was started.
This issue was rated as low.
Please submit fixed packages until 2019-05-24.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/64265
Comment 9 Swamp Workflow Management 2020-09-21 13:18:42 UTC
SUSE-SU-2020:2687-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 921719
CVE References: CVE-2014-9488
JIRA References: 
Sources used:
SUSE Linux Enterprise Server 12-SP5 (src):    less-458-7.3.3

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Wolfgang Frisch 2020-09-23 15:55:52 UTC
Released.