Bug 1683404

Summary: edk2: stack buffer overflow in file/path name string check in UdfDxe/File.c
Product: [Other] Security Response Reporter: Laura Pardo <lpardo>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: areis, berrange, bmcclain, crobinso, dblechte, dfediuck, eedri, kraxel, lersek, mgoldboi, michal.skrivanek, pbonzini, philmd, sbonazzo, sherold, virt-maint, virt-maint
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-03-22 07:16:25 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1683405, 1683406, 1690846, 1690847    
Bug Blocks: 1683431    

Description Laura Pardo 2019-02-26 19:32:29 UTC
A vulnerability was found in edk2. A stack buffer overflow in file/path name string check in UdfDxe/File.c when a long file name (> 128 characters) or a long path name (> 256 characters) is supplied.


Upstream Bug:
https://bugzilla.tianocore.org/show_bug.cgi?id=828

Upstream Patch:
https://github.com/tianocore/edk2/commit/b9ae1705adfdd43668027a25a2b03c2e81960219

Comment 1 Laura Pardo 2019-02-26 19:32:51 UTC
Created edk2 tracking bugs for this issue:

Affects: epel-all [bug 1683406]
Affects: fedora-all [bug 1683405]

Comment 10 Riccardo Schirone 2019-03-22 07:16:25 UTC
Closing this in favor of bug 1691640.