Bug 1737785 (CVE-2019-1010238)

Summary: CVE-2019-1010238 pango: pango_log2vis_get_embedding_levels() heap-based buffer overflow
Product: [Other] Security Response Reporter: Marian Rehak <mrehak>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: caillon+fedoraproject, eng-i18n-bugs, fonts-bugs, gnome-sig, i18n-bugs, john.j5live, kyoshida, mclasen, pwu, rhughes, rstrode, sandmann, scorneli, tagoh, yozone
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-08-28 19:07:22 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1738460, 1737786, 1738459, 1738461, 1738462, 1756290    
Bug Blocks: 1737787    

Description Marian Rehak 2019-08-06 08:41:00 UTC
Gnome Pango 1.42 and later is affected by: Buffer Overflow. The impact is: The heap based buffer overflow can be used to get code execution. The component is: function name: pango_log2vis_get_embedding_levels, assignment of nchars and the loop condition. The attack vector is: Bug can be used when application pass invalid utf-8 strings to functions like pango_itemize.

External References:

https://packetstormsecurity.com/files/153838/USN-4081-1.txt
https://gitlab.gnome.org/GNOME/pango/issues/342

Comment 1 Marian Rehak 2019-08-06 08:41:11 UTC
Created pango tracking bugs for this issue:

Affects: fedora-all [bug 1737786]

Comment 6 errata-xmlrpc 2019-08-28 17:01:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2019:2571 https://access.redhat.com/errata/RHSA-2019:2571

Comment 7 Product Security DevOps Team 2019-08-28 19:07:22 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-1010238

Comment 8 errata-xmlrpc 2019-08-29 06:50:51 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2019:2582 https://access.redhat.com/errata/RHSA-2019:2582

Comment 13 Jens Petersen 2019-09-10 04:07:31 UTC
Anyway I requested 7.6.z now in bug 1738459 - I hope that works even though the bug is closed since we shipped the 7.7.z update.

Comment 17 errata-xmlrpc 2019-10-29 14:03:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.6 Extended Update Support

Via RHSA-2019:3234 https://access.redhat.com/errata/RHSA-2019:3234