Bug 488026 (CVE-2009-0585)
Summary: | CVE-2009-0585 libsoup: integer overflow in soup_base64_encode() | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Tomas Hoger <thoger> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED ERRATA | QA Contact: | |||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | unspecified | CC: | danw, kreilly, mbarnes, security-response-team | ||||
Target Milestone: | --- | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2009-03-20 07:41:19 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 488028, 488029, 488030, 488031, 488032, 488033, 833927 | ||||||
Bug Blocks: | |||||||
Attachments: |
|
Description
Tomas Hoger
2009-03-02 09:16:56 UTC
Note: This issue was found during the investigation of glib2's CVE-2008-4316. Created attachment 333717 [details]
Possible patch
Note: The issue also exists in libsoup version shipped in Red Hat Enterprise Linux 3. However, there's not application using affected function there out of libsoup itself. Inside libsoup, soup_base64_encode() is only used on trusted inputs. Due to that, we currently do not plan to address this flaw on Red Hat Enterprise Linux 3. Upstream SVN commit that changed base64 functions to glib wrappers: http://svn.gnome.org/viewvc/libsoup?view=revision&revision=921 Fix for glib is now committed in glib's upstream SVN now: https://bugzilla.redhat.com/show_bug.cgi?id=474770#c17 Lifting embargo on this too. This issue has been addressed in following products: Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 5 Via RHSA-2009:0344 https://rhn.redhat.com/errata/RHSA-2009-0344.html This issue was addressed in: Red Hat Enterprise Linux: http://rhn.redhat.com/errata/RHSA-2009-0344.html |