Bug 1228143 (CVE-2024-1013)

Summary: VUL-0: CVE-2024-1013: unixODBC,unixODBC_23: out of bounds stack write due to pointer-to-integer types conversion
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Michael Vetter <mvetter>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Major    
Priority: P3 - Medium CC: abergmann, camila.matos, mvetter
Version: unspecifiedFlags: camila.matos: needinfo? (mvetter)
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/398036/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-1013:7.1:(AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-07-19 10:57:27 UTC
An out-of-bounds stack write flaw was found in unixODBC on 64-bit architectures where the caller has 4 bytes and callee writes 8 bytes. This issue may go unnoticed on little-endian architectures, while big-endian architectures can be broken.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-1013
https://www.cve.org/CVERecord?id=CVE-2024-1013
https://access.redhat.com/security/cve/CVE-2024-1013
https://bugzilla.redhat.com/show_bug.cgi?id=2260823
https://github.com/lurcher/unixODBC/pull/157
Comment 1 Michael Vetter 2024-07-19 11:02:32 UTC
That is in the example postgres driver which we don't ship. We use psqlODBC.