In The Sleuth Kit (TSK) through 4.6.4, hfs_cat_traverse in tsk/fs/hfs.c does not properly determine when a key length is too large, which allows attackers to cause a denial of service (SEGV on unknown address with READ memory access in a tsk_getu16 call in hfs_dir_open_meta_cb in tsk/fs/hfs_dent.c).
https://lists.debian.org/debian-lts-announce/2022/06/msg00015.html
https://lists.debian.org/debian-lts-announce/2018/12/msg00008.html
https://github.com/sleuthkit/sleuthkit/pull/1374
https://github.com/sleuthkit/sleuthkit/commit/bc04aa017c0bd297de8a3b7fc40ffc6ddddbb95d