Bugzilla – Bug 921719
VUL-1: CVE-2014-9488: less: out of bounds read acces with invalid UTF-8
Last modified: 2021-08-31 07:23:10 UTC
Created attachment 626307 [details] patch extracted from https://blog.fuzzing-project.org/3-less-out-of-bounds-read-access-TFPA-0022014.html via OSS:2015/Q1/797 https://blog.fuzzing-project.org/3-less-out-of-bounds-read-access-TFPA-0022014.html Hanno Böck reported: > less out of bounds read access - TFPA 002/2014 > > An out of bounds read access in the UTF-8 decoding can be triggered with a malformed > file in the tool less. The access happens in the function is_utf8_well_formed (charset.c, > line 534) due to a truncated multibyte character in the sample file. It affects the latest > upstream less version 470. The bug does not crash less, it can only be made visible by > running less with valgrind or compiling it with Address Sanitizer. The security impact is > likely minor as it is only an invalid read access. > > This issue has been found with the help of Address Sanitizer. [...] > Update 2015-03-10: Version 475 of less contains a fix for this issue. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9488 http://seclists.org/oss-sec/2015/q1/797 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9488
bugbot adjusting priority
| Product | Version | Affected | Request | |---------------|---------|----------|---------| | SLE11 | 424b | yes | wait | | SLE12 | 458 | yes | wait | | openSUSE 13.1 | 458 | yes | #290996 | | openSUSE 13.2 | 458 | yes | #290996 | | Factory | 458 | yes | #290992 | The affected row from the patch is in all our products. The fix was submitted to openSUSE and Factory. I'm reassigning it back to security-team until the submissions for SLE are needed.
This is an autogenerated message for OBS integration: This bug (921719) was mentioned in https://build.opensuse.org/request/show/290996 13.2+13.1 / less
openSUSE-SU-2015:0595-1: An update that fixes one vulnerability is now available. Category: security (low) Bug References: 921719 CVE References: CVE-2014-9488 Sources used: openSUSE 13.2 (src): less-458-6.4.1 openSUSE 13.1 (src): less-458-2.8.1
(In reply to Andreas Stieger from comment #0) > Created attachment 626307 [details] > patch extracted from > https://blog.fuzzing-project.org/3-less-out-of-bounds-read-access-TFPA- > 0022014.html > > via OSS:2015/Q1/797 > https://blog.fuzzing-project.org/3-less-out-of-bounds-read-access-TFPA- > 0022014.html > Hanno Böck reported: > > > less out of bounds read access - TFPA 002/2014 > > > > An out of bounds read access in the UTF-8 decoding can be triggered with a malformed > > file in the tool less. The access happens in the function is_utf8_well_formed (charset.c, > > line 534) due to a truncated multibyte character in the sample file. It affects the latest > > upstream less version 470. The bug does not crash less, it can only be made visible by > > running less with valgrind or compiling it with Address Sanitizer. The security impact is > > likely minor as it is only an invalid read access. > > > > This issue has been found with the help of Address Sanitizer. > [...] > > Update 2015-03-10: Version 475 of less contains a fix for this issue. > > References: > http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9488 > http://seclists.org/oss-sec/2015/q1/797 > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9488 Does this patch work?
An update workflow for this issue was started. This issue was rated as low. Please submit fixed packages until 2019-05-24. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/64265
SUSE-SU-2020:2687-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 921719 CVE References: CVE-2014-9488 JIRA References: Sources used: SUSE Linux Enterprise Server 12-SP5 (src): less-458-7.3.3 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Released.