An issue was found in The Sleuth Kit (TSK) through 4.6.4. The hfs_cat_traverse function in tsk/fs/hfs.c does not properly determine when a key length is too large, which allows attackers to cause a denial of service (SEGV on unknown address with READ memory access in a tsk_getu16 call in hfs_dir_open_meta_cb in tsk/fs/hfs_dent.c). References: https://github.com/sleuthkit/sleuthkit/pull/1374 Upstream Patch: https://github.com/sleuthkit/sleuthkit/commit/bc04aa017c0bd297de8a3b7fc40ffc6ddddbb95d
Created sleuthkit tracking bugs for this issue: Affects: epel-7 [bug 1656199] Affects: fedora-all [bug 1656198]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.