Bug 1312337 (CVE-2016-9082)
Summary: | CVE-2016-9082 cairo: Out of bounds read in read_png/write_png in cairo-png.c | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED WONTFIX | QA Contact: | |||||
Severity: | low | Docs Contact: | |||||
Priority: | low | ||||||
Version: | unspecified | CC: | bmcclain, cfergeau, dblechte, eedri, gklein, lsurette, mgoldboi, michal.skrivanek, otte, phracek, rbalakri, sardella, security-response-team, sherold, slawomir, srevivo, ykaul, ylavi | ||||
Target Milestone: | --- | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2016-10-19 19:58:58 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 1384554, 1384555, 1384556 | ||||||
Bug Blocks: | 1312341, 1382656, 1382664 | ||||||
Attachments: |
|
Description
Adam Mariš
2016-02-26 13:10:34 UTC
Created attachment 1130832 [details]
Backtrace report
*** Bug 1382656 has been marked as a duplicate of this bug. *** CVE request: http://seclists.org/oss-sec/2016/q4/44 Upstream bug: https://bugs.freedesktop.org/show_bug.cgi?id=98165 Created cairo tracking bugs for this issue: Affects: fedora-all [bug 1384554] Created mingw-cairo tracking bugs for this issue: Affects: fedora-all [bug 1384555] Affects: epel-7 [bug 1384556] The upstream bug mentions a separate issue that may cause out-of-bounds writes. While this looks correct initially, I don't think that this is feasible: The memory is allocated using _cairo_malloc_ab(), which has a built-in overflow check. As far as I can tell, this will catch the problem before we can reach the problematic code. This leaves only the out-of-bounds read, which, all things considered, isn't really that dangerous. *** Bug 1382658 has been marked as a duplicate of this bug. *** *** Bug 1382659 has been marked as a duplicate of this bug. *** *** Bug 1382662 has been marked as a duplicate of this bug. *** Proposed patch: https://bugs.freedesktop.org/attachment.cgi?id=127421 |