Bug 1422907 (CVE-2017-6010)
Summary: | CVE-2017-6010 icoutils: Buffer overflow in the extract_icons function | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Andrej Nemec <anemec> | ||||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||
Status: | CLOSED ERRATA | QA Contact: | |||||||
Severity: | medium | Docs Contact: | |||||||
Priority: | medium | ||||||||
Version: | unspecified | CC: | carnil, martin.gieseking, rjones | ||||||
Target Milestone: | --- | Keywords: | Security | ||||||
Target Release: | --- | ||||||||
Hardware: | All | ||||||||
OS: | Linux | ||||||||
Whiteboard: | |||||||||
Fixed In Version: | icoutils 0.31.2 | Doc Type: | If docs needed, set a value | ||||||
Doc Text: |
A vulnerability was found in icoutils, in the icotool program. An attacker could create a crafted ICO or CUR file that, when read by icotool, could result in memory corruption leading to a crash or potential code execution.
|
Story Points: | --- | ||||||
Clone Of: | Environment: | ||||||||
Last Closed: | 2019-06-08 03:07:49 UTC | Type: | --- | ||||||
Regression: | --- | Mount Type: | --- | ||||||
Documentation: | --- | CRM: | |||||||
Verified Versions: | Category: | --- | |||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||
Embargoed: | |||||||||
Bug Depends On: | 1422911, 1430609, 1430610, 1430611 | ||||||||
Bug Blocks: | 1411254 | ||||||||
Attachments: |
|
Description
Andrej Nemec
2017-02-16 14:22:26 UTC
Created attachment 1250878 [details]
Reporter writeup
Created icoutils tracking bugs for this issue: Affects: fedora-all [bug 1422911] Created attachment 1256393 [details]
fixes memory issue triggered by number overflow
This patch should fix the issue.
Hi Martin Has this been forwarded to upstream? Regards, Salvatore Hi Salvatore, yes, I sent the patches to upstream but haven't received a reply yet. Created icoutils tracking bugs for this issue: Affects: epel-6 [bug 1430609] This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:0837 https://rhn.redhat.com/errata/RHSA-2017-0837.html |