An issue was found in The Sleuth Kit (TSK) through 4.6.4. The hfs_cat_traverse function in tsk/fs/hfs.c does not properly determine when a key length is too large, which allows attackers to cause a denial of service (SEGV on unknown address with READ memory access in a tsk_getu16 call in hfs_dir_open_meta_cb in tsk/fs/hfs_dent.c).
Created sleuthkit tracking bugs for this issue:
Affects: epel-7 [bug 1656199]
Affects: fedora-all [bug 1656198]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.