Upstream information

CVE-2019-20016 at MITRE

Description

libmysofa before 2019-11-24 does not properly restrict recursive function calls, as demonstrated by reports of stack consumption in readOHDRHeaderMessageDatatype in dataobject.c and directblockRead in fractalhead.c. NOTE: a download of v0.9 after 2019-12-06 should fully remediate this issue.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.3
Vector AV:N/AC:M/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
CVSS v3 Scores
  National Vulnerability Database
Base Score 6.5
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction Required
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact High
CVSSv3 Version 3.1
SUSE Bugzilla entry: 1159839 [IN_PROGRESS]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Package Hub 15 SP2
  • libmysofa-devel >= 0.9.1-bp152.4.3.1
  • libmysofa0 >= 0.9.1-bp152.4.3.1
  • libmysofa0-64bit >= 0.9.1-bp152.4.3.1
Patchnames:
openSUSE-2021-459
openSUSE Leap 15.2
  • libmysofa-devel >= 0.9.1-lp152.3.3.1
  • libmysofa0 >= 0.9.1-lp152.3.3.1
Patchnames:
openSUSE-2021-444
openSUSE Tumbleweed
  • libmysofa-devel >= 1.2-1.3
  • libmysofa1 >= 1.2-1.3
  • libmysofa1-32bit >= 1.2-1.3
Patchnames:
openSUSE Tumbleweed GA libmysofa-devel-1.2-1.3


SUSE Timeline for this CVE

CVE page created: Fri Dec 27 09:22:40 2019
CVE page last modified: Tue May 23 15:25:04 2023