Bug 1665532 (CVE-2018-20532) - CVE-2018-20532 libsolv: NULL pointer dereference in function testcase_read
Summary: CVE-2018-20532 libsolv: NULL pointer dereference in function testcase_read
Status: NEW
Alias: CVE-2018-20532
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=low,public=20181122,reported=2...
Keywords: Security
Depends On: 1669562 1652605 1665533 1669563
Blocks: 1665540
TreeView+ depends on / blocked
 
Reported: 2019-01-11 16:49 UTC by Laura Pardo
Modified: 2019-06-14 09:15 UTC (History)
2 users (show)

(edit)
Clone Of:
(edit)
Last Closed:


Attachments (Terms of Use)

Description Laura Pardo 2019-01-11 16:49:59 UTC
A vulnerability was found in libsolv through 0.7.2. There is a NULL pointer dereference at ext/testcase.c (function testcase_read) in libsolvext.a that will cause a denial of service.


References:
https://bugzilla.redhat.com/show_bug.cgi?id=1652605

Upstream Patch:
https://github.com/openSUSE/libsolv/pull/291

Comment 1 Laura Pardo 2019-01-11 16:50:13 UTC
Created libsolv tracking bugs for this issue:

Affects: fedora-all [bug 1665533]

Comment 2 Riccardo Schirone 2019-01-25 16:30:58 UTC
Function testcase_read() read a testcase from a file, however when the file is malformed and it contains a "namespace" entry, a typo in an error check condition in the code makes the program continue with the malformed input, crashing shortly after the check because it tries to access a pointer to NULL.

Comment 4 Riccardo Schirone 2019-01-25 16:44:46 UTC
On Red Hat Enterprise Linux the testsolv program is not shipped with any package, thus the flaw cannot be easily triggered, unless an existing program uses the vulnerable function testcase_read().


Note You need to log in before you can comment on or make changes to this bug.