Bug 1416410 (CVE-2016-10164)

Summary: CVE-2016-10164 libXpm: Out-of-bounds write in XPM extension parsing
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: btissoir, slawomir, slong
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: libXpm 3.5.12 Doc Type: If docs needed, set a value
Doc Text:
An integer overflow flaw leading to a heap-based buffer overflow was found in libXpm. An attacker could use this flaw to crash an application using libXpm via a specially crafted XPM file.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 03:06:22 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1416442, 1431946    
Bug Blocks: 1416412    

Description Andrej Nemec 2017-01-25 12:56:31 UTC
An out of boundary write has been found in libXpm which can be exploited by an attacker through maliciously crafted XPM files.

The affected code is prone to two 32 bit integer overflows while parsing extensions: the amount of extensions and their concatenated length.



Upstream patch:


Comment 1 Andrej Nemec 2017-01-25 13:52:17 UTC
Created libXpm tracking bugs for this issue:

Affects: fedora-24 [bug 1416442]

Comment 4 errata-xmlrpc 2017-08-01 16:04:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:1865 https://access.redhat.com/errata/RHSA-2017:1865