Bug 1524378

Summary: libgxps: integer overflow when loading XPS documents containing specially crafted PNG files
Product: [Other] Security Response Reporter: Stefan Cornelius <scorneli>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: mkasik, scorneli, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 03:33:01 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1591132, 1591133    
Bug Blocks: 1487550    

Description Stefan Cornelius 2017-12-11 11:44:13 UTC
An integer overflow flaw exists within the "gxps_images_create_from_png()" function in libgxps/gxps-images.c. An attacker can exploit this flaw to cause a heap-based buffer overflow by tricking a user into opening a specially crafted XPS document in an application using libgxps.

Comment 1 Stefan Cornelius 2017-12-12 09:17:14 UTC
Actually, it seesm like RHEL7 is not affected. We have a patch (libgxps-0.2.4-GXPSImage.patch), which appears to always cause a crash shortly before reaching the vulnerable code path.

Comment 3 Stefan Cornelius 2018-04-04 08:59:08 UTC
Acknowledgments:

Name: Stefan Cornelius (Red Hat)

Comment 5 Stefan Cornelius 2018-06-14 06:57:03 UTC
Created libgxps tracking bugs for this issue:

Affects: fedora-all [bug 1591132]