On Tue, Feb 19, 2019 at 05:39:10PM +0100, Moritz Mühlenhoff wrote:
> On Tue, Nov 27, 2018 at 01:38:43PM +0100, Jordy Zomer wrote:
> > Package: sleuthkit
> > Version: 4.2.0-3
> > Severity: normal
> > 
> > Dear Maintainer,
> > 
> > An issue was discovered in The Sleuth Kit (TSK) through 4.6.4.
> > The "tsk_getu16(hfs->fs_info.endian, &rec_buf[rec_off2])" call in 
> > hfs_dir_open_meta_cb in
> > tsk/fs/hfs_dent.c does not properly check boundaries. This results in
> > a crash (SEGV on unknown address
> > READ memory access)
> > when reading too much in the destination buffer.
> > 
> > this is because the boundary check in hfs_traverse_cat wasn't done properly.
> > 
> > The following CVE was assigned (It's still reserved):
> > 
> > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19497
> 
> Fixed in 
> https://github.com/sleuthkit/sleuthkit/commit/bc04aa017c0bd297de8a3b7fc40ffc6ddddbb95d

*ping*, could we get that into buster still?

Cheers,
        Moritz

Reply via email to