Bug 1812633 (CVE-2019-20509)
Summary: | CVE-2019-20509 libarchive: heap-based buffer overflow in archive_read_support_format_lha.c due to insufficient validation of UTF-16 input | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | besser82, databases-maint, dhiru, mike, moez.roy, ndevos, odubaj, panovotn, pkubat, praiskup, zbyszek |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | libarchive 3.4.1 | Doc Type: | If docs needed, set a value |
Doc Text: |
[REJECTED CVE] A vulnerability has been identified in Libarchive in archive_read_support_format_lha.c file. It does not ensure valid sizes for UTF-16 input, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted LHA archive.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-03-24 16:32:00 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1812636, 1812637, 1812638, 1812640, 1812641, 1812642, 1812643 | ||
Bug Blocks: | 1812639 |
Description
Guilherme de Almeida Suckevicz
2020-03-11 18:12:38 UTC
Created libarchive tracking bugs for this issue: Affects: fedora-all [bug 1812636] Created libarchive3 tracking bugs for this issue: Affects: epel-6 [bug 1812640] Created mingw-libarchive tracking bugs for this issue: Affects: fedora-all [bug 1812637] Created python-libarchive tracking bugs for this issue: Affects: epel-7 [bug 1812641] Created python-libarchive-c tracking bugs for this issue: Affects: epel-7 [bug 1812642] Affects: epel-8 [bug 1812643] Affects: fedora-all [bug 1812638] Vulnerability introduced in commit https://github.com/libarchive/libarchive/commit/0f1e37b54ae436536fe9522b9cb8380d9be29a03 , which was first introduced in upstream release 3.4.1. The vulnerability was introduced and fixed in the same version, so there is actually no released version with the vulnerable code. This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-20509 |