Bug 1524909 (CVE-2017-17507)

Summary: CVE-2017-17507 hdf5: Out-of-bounds read in the H5T_conv_struct_opt function
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: anto.trande, apevec, ccoleman, c.david86, chrisw, dakingun, dedgar, dmcphers, hbrock, jgoulding, jjoyce, jschluet, jslagle, kbasil, lhh, lpeer, markmc, mburns, orion, rbryant, rhel-osp-director-maint, rhos-maint, sclewis, slinaber, tdecacqu
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 03:33:57 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1524917, 1524918, 1524919, 1530408    
Bug Blocks: 1524924    

Description Andrej Nemec 2017-12-12 09:59:16 UTC
In HDF5 1.10.1, there is an out of bounds read vulnerability in the function H5T_conv_struct_opt in H5Tconv.c in libhdf5.a. For example, h5dump would crash when someone opens a crafted hdf5 file.



Comment 1 Andrej Nemec 2017-12-12 10:03:10 UTC
Created hdf5 tracking bugs for this issue:

Affects: epel-all [bug 1524917]
Affects: fedora-all [bug 1524918]
Affects: openshift-1 [bug 1524919]

Comment 2 Joshua Padman 2017-12-20 04:11:11 UTC

Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Whilst the package shipped with Red Hat OpenStack contains the vulnerable code, the packages that use HDF5 do not expose the vulnerable functionality.