Bugzilla – Bug 1117672
VUL-1: CVE-2018-19497: sleuthkit: out of bounds read
Last modified: 2024-07-04 11:57:01 UTC
CVE-2018-19497 An issue was discovered in The Sleuth Kit (TSK) through 4.6.4. The "tsk_getu16(hfs->fs_info.endian, &rec_buf[rec_off2])" call in hfs_dir_open_meta_cb in tsk/fs/hfs_dent.c does not properly check boundaries. This results in a crash (SEGV on unknown address READ memory access) when reading too much in the destination buffer. this is because the boundary check in hfs_traverse_cat wasn't done properly. Kind Regards, Jordy Zomer https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19497 https://github.com/sleuthkit/sleuthkit/pull/1374 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914796
This is automated batch bugzilla cleanup. The openSUSE 42.3 changed to end-of-life (EOL [1]) status. As such it is no longer maintained, which means that it will not receive any further security or bug fix updates. As a result we are closing this bug. If you can reproduce this bug against a currently maintained version of openSUSE (At this moment openSUSE Leap 15.1, 15.0 and Tumbleweed) please feel free to reopen this bug against that version (!you must update the "Version" component in the bug fields, do not just reopen please), or alternatively create a new ticket. Thank you for reporting this bug and we are sorry it could not be fixed during the lifetime of the release. [1] https://en.opensuse.org/Lifetime
15.0 and 15.1 did not receive fixes yet
Not fixed in Leap 15.1 yet.
Fixed in all supported codestreams: openSUSE:Factory/sleuthkit openSUSE:Backports:SLE-15-SP5:Update/sleuthkit openSUSE:Backports:SLE-15-SP6:Update/sleuthkit