Bug 1773683 (CVE-2019-17402)
Summary: | CVE-2019-17402 exiv2: out-of-bounds read in CiffDirectory::readDirectory due to lack of size check | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | jgrulich, michel, rdieter, rschiron |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | exiv2 0.27.3 | Doc Type: | If docs needed, set a value |
Doc Text: |
An out of bounds read vulnerability was discovered in the way exiv2 parses Canon raw format (CRW) images. An application that uses exiv2 library to parse untrusted images may be vulnerable to this flaw, which could be used by an attacker to extract data from the application's memory or make it crash. The biggest threat with this vulnerability is availability of the system.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-09-29 21:58:53 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1773684, 1775695, 1775696, 1954494 | ||
Bug Blocks: | 1773685 |
Description
Guilherme de Almeida Suckevicz
2019-11-18 17:47:30 UTC
Created exiv2 tracking bugs for this issue: Affects: fedora-all [bug 1773684] Upstream patch: http://github.com/Exiv2/exiv2/commit/88054239e3c914862d13f6ac89a19a104fa2c076 [master branch] http://github.com/Exiv2/exiv2/commit/50e9dd964a439da357798344ed1dd86edcadf0ec [0.27-maintanance branch] Opened upstream issue to discuss improving the fix: http://github.com/Exiv2/exiv2/issues/1026 No release yet includes the fix. Function CiffDirectory::readDirectory(), called by CiffDirectory::doRead(), assumes that the buffer `pData` is at least `size` bytes large. This is not always true, as the `size` value is read from the image itself (in CiffComponent::doRead() function) and there are not enough checks to ensure this holds true. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:4030 http://access.redhat.com/errata/RHSA-2020:4030 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): http://access.redhat.com/security/cve/cve-2019-17402 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:1758 http://access.redhat.com/errata/RHSA-2021:1758 |