Bug 1478373 (CVE-2017-7555)
| Summary: | CVE-2017-7555 augeas: Improper handling of escaped strings leading to memory corruption | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | unspecified | CC: | aortega, apevec, apevec, chrisw, cvsbot-xmlrpc, dblechte, dcleal, dfediuck, dmoppert, dominic, dougsland, eedri, jjoyce, jschluet, kbasil, lhh, lpeer, lutter, markmc, mgoldboi, michal.skrivanek, ptoscano, rbalakri, rbryant, rhos-maint, sbonazzo, sclewis, security-response-team, sherold, sisharma, smohan, srevivo, ssaha, tdecacqu, vbellur, yturgema |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | augeas 1.8.1 | Doc Type: | If docs needed, set a value |
| Doc Text: |
A vulnerability was discovered in augeas affecting the handling of escaped strings. An attacker could send crafted strings that would cause the application using augeas to copy past the end of a buffer, leading to a crash or possible code execution.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2017-09-26 00:21:12 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1475621, 1481545, 1481546, 1482340, 1483825, 1483826, 1483913, 1724856 | ||
| Bug Blocks: | 1478377 | ||
|
Description
Adam Mariš
2017-08-04 13:07:59 UTC
Acknowledgments: Name: Han Han (Red Hat) Upstream patch: https://github.com/hercules-team/augeas/pull/480 Since the patch is already public, going for immediate disclosure on this. Rated as Important due to exposure in libvirtd. The above patch includes good test coverage, so no further test/repro is required for QE. Created augeas tracking bugs for this issue: Affects: fedora-all [bug 1482340] Upstream release 1.8.1 contains the fix for this issue: https://github.com/hercules-team/augeas/releases/tag/release-1.8.1 Tarball available from: http://download.augeas.net/ This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:2788 https://access.redhat.com/errata/RHSA-2017:2788 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.3 Advanced Update Support Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions Red Hat Enterprise Linux 7.3 Telco Extended Update Support Via RHSA-2019:2403 https://access.redhat.com/errata/RHSA-2019:2403 |