Bug 1666023 (CVE-2018-20721)

Summary: CVE-2018-20721 uriparser: Out-of-bounds read in uriParse*Ex*
Product: [Other] Security Response Reporter: Laura Pardo <lpardo>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: contribs, huzaifas, jkucera, manisandro, rakesh.pandit
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: uriparser 0.9.1 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-10-27 03:21:19 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1666025, 1666026, 1667917    
Bug Blocks: 1666027    

Description Laura Pardo 2019-01-14 16:58:11 UTC
A flaw was found in uriparser before version 0.9.1. An Out-of-bounds read in uriParse*Ex* for incomplete URIs with IPv6 addresses with embedded IPv4 address, e.g. "//[::44.1"; mitigated if passed parameter <afterLast> points to readable memory containing a '\0' byte.


References:
https://github.com/uriparser/uriparser/blob/uriparser-0.9.1/ChangeLog#L9

Upstream Patch:
https://github.com/uriparser/uriparser/commit/cef25028de5ff872c2e1f0a6c562eb3ea9ecbce4

Comment 1 Laura Pardo 2019-01-14 16:58:27 UTC
Created mingw-uriparser tracking bugs for this issue:

Affects: fedora-all [bug 1666026]


Created uriparser tracking bugs for this issue:

Affects: fedora-all [bug 1666025]

Comment 3 Stefan Cornelius 2019-01-21 12:33:43 UTC
Statement:

This issue affects the versions of uriparser as shipped with Red Hat Enterprise Linux 7.