Bug 1579946 (CVE-2018-11202)

Summary: CVE-2018-11202 hdf5: NULL pointer dereference in H5S_hyper_make_spans in H5Shyper.c
Product: [Other] Security Response Reporter: Laura Pardo <lpardo>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: anto.trande, apevec, caolanm, c.david86, chrisw, dakingun, hbrock, jjoyce, jschluet, jslagle, lhh, lpeer, markmc, mburns, orion, rbryant, sclewis, slinaber, tdecacqu
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A NULL pointer dereference flaw was found in H5S_hyper_make_spans in H5Shyper.c in the HDF HDF5 1.10.2 library. This could allow a remote denial of service attack.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-10-21 20:04:11 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1579947, 1579949, 1579964, 1584436, 1584437, 1584438, 1584439, 1584440, 1584441    
Bug Blocks: 1579966    
Attachments:
Description Flags
a plausible fix none

Description Laura Pardo 2018-05-18 19:49:14 UTC
A flaw was found in the HDF HDF5 1.10.2 library. A NULL pointer dereference was discovered in H5S_hyper_make_spans in H5Shyper.c. It could allow a remote denial of service attack.


References:
https://github.com/Twi1ight/fuzzing-pocs/tree/master/hdf5

Comment 1 Laura Pardo 2018-05-18 19:50:48 UTC
Created hdf5 tracking bugs for this issue:

Affects: epel-all [bug 1579947]
Affects: fedora-all [bug 1579949]

Comment 4 Caolan McNamara 2018-05-21 12:10:18 UTC
Created attachment 1439597 [details]
a plausible fix

Comment 6 Joshua Padman 2018-05-29 03:17:10 UTC
This affects the hdf5 versions delivered by RHOS. However, there is very low likelihood that an attacker would be able to exploit this in a meaningful way through gnocchi. 

Dependency trail.
  gnocchi->python-pandas->python-tables->hdf5

By default RHOS:
https://access.redhat.com/documentation/en-us/red_hat_openstack_platform/12/html/logging_monitoring_and_troubleshooting_guide/configuring_the_time_series_database_gnocchi_for_telemetry#time_series_database_components
"To store the aggregated measures, Gnocchi relies on either Swift or Ceph (Object Storage). Gnocchi also leverages MySQL to store the index of resources and metrics." HDF5 is a lose requirement.