Bug 1820656 (CVE-2020-11105) - CVE-2020-11105 cereal: std::shared_ptr serialization asymmetry
Summary: CVE-2020-11105 cereal: std::shared_ptr serialization asymmetry
Keywords:
Status: CLOSED UPSTREAM
Alias: CVE-2020-11105
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1820658 1820657
Blocks:
TreeView+ depends on / blocked
 
Reported: 2020-04-03 14:25 UTC by Guilherme de Almeida Suckevicz
Modified: 2020-04-03 16:31 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-04-03 16:31:59 UTC
Embargoed:


Attachments (Terms of Use)

Description Guilherme de Almeida Suckevicz 2020-04-03 14:25:14 UTC
An issue was discovered in USC iLab cereal through 1.3.0. It employs caching of std::shared_ptr values, using the raw pointer address as a unique identifier. This becomes problematic if an std::shared_ptr variable goes out of scope and is freed, and a new std::shared_ptr is allocated at the same address. Serialization fidelity thereby becomes dependent upon memory layout. In short, serialized std::shared_ptr variables cannot always be expected to serialize back into their original values. This can have any number of consequences, depending on the context within which this manifests.

Reference:
https://github.com/USCiLab/cereal/issues/636

Comment 1 Guilherme de Almeida Suckevicz 2020-04-03 14:26:10 UTC
Created cereal tracking bugs for this issue:

Affects: epel-7 [bug 1820658]
Affects: fedora-all [bug 1820657]

Comment 2 Product Security DevOps Team 2020-04-03 16:31:59 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.


Note You need to log in before you can comment on or make changes to this bug.