In The Sleuth Kit (TSK) through 4.6.4, hfscattraverse in tsk/fs/hfs.c does not properly determine when a key length is too large, which allows attackers to cause a denial of service (SEGV on unknown address with READ memory access in a tskgetu16 call in hfsdiropenmetacb in tsk/fs/hfsdent.c).
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.6.5-1", "binary_name": "libtsk-dev" }, { "binary_version": "4.6.5-1", "binary_name": "libtsk13" }, { "binary_version": "4.6.5-1", "binary_name": "libtsk13-dbgsym" }, { "binary_version": "4.6.5-1", "binary_name": "sleuthkit" }, { "binary_version": "4.6.5-1", "binary_name": "sleuthkit-dbgsym" } ] }