Bug 488226 (CVE-2009-0587)
Summary: | CVE-2009-0587 evolution-data-server: integer overflow in base64 encoding functions | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Tomas Hoger <thoger> | ||||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||
Status: | CLOSED ERRATA | QA Contact: | |||||||
Severity: | low | Docs Contact: | |||||||
Priority: | low | ||||||||
Version: | unspecified | CC: | bressers, jlieskov, kreilly, mbarnes, mcrha, mjc, pasteur, security-response-team, tyan | ||||||
Target Milestone: | --- | Keywords: | Security | ||||||
Target Release: | --- | ||||||||
Hardware: | All | ||||||||
OS: | Linux | ||||||||
Whiteboard: | |||||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||||
Doc Text: | Story Points: | --- | |||||||
Clone Of: | Environment: | ||||||||
Last Closed: | 2009-03-18 07:36:03 UTC | Type: | --- | ||||||
Regression: | --- | Mount Type: | --- | ||||||
Documentation: | --- | CRM: | |||||||
Verified Versions: | Category: | --- | |||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||
Embargoed: | |||||||||
Bug Depends On: | 488278, 488279, 488280, 488281, 488293, 488439, 488440, 488441, 488442 | ||||||||
Bug Blocks: | |||||||||
Attachments: |
|
Description
Tomas Hoger
2009-03-03 10:58:55 UTC
Created attachment 333864 [details] Possible fix for _evc_base64_encode_simple() Based on glib2's patch, see bug #474770. Created attachment 333866 [details]
Possible fix for camel_base64_encode_simple()
Unlike patch for _evc_base64_encode_simple(), this g_errors for large inputs rather than returning NULL, as camel_base64_encode_simple() does not seem to be be expected to ever return NULL. Failing g_error should not be a big issue though, as with multiplication and division operations reversed, only inputs of 3gig+ (on 32 bit systems) can trigger overflow, which are quite unlikely.
Fix for glib is now committed in glib's upstream SVN now: https://bugzilla.redhat.com/show_bug.cgi?id=474770#c17 Lifting embargo on this too. Upstream SVN commit: http://svn.gnome.org/viewvc/evolution-data-server?view=revision&revision=10161 This issue has been addressed in following products: Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 5 Via RHSA-2009:0354 https://rhn.redhat.com/errata/RHSA-2009-0354.html This issue has been addressed in following products: Red Hat Enterprise Linux 4 Via RHSA-2009-0355 https://rhn.redhat.com/errata/RHSA-2009-0355.html This issue has been addressed in following products: Red Hat Enterprise Linux 3 Via RHSA-2009:0358 https://rhn.redhat.com/errata/RHSA-2009-0358.html as of Mon Mar 16 21:36:06 CET 2009 the src.rpm are not available on ftp://updates.redhat.com/ [tru@carrington ~]$ HEAD ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/evolution-1.4.5-25.el3.src.rpm 404 File 'evolution-1.4.5-25.el3.src.rpm' not found Client-Date: Mon, 16 Mar 2009 20:36:14 GMT [tru@carrington ~]$ HEAD ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/evolution-2.0.2-41.el4_7.2.src.rpm 404 File 'evolution-2.0.2-41.el4_7.2.src.rpm' not found Client-Date: Mon, 16 Mar 2009 20:37:07 GMT [tru@carrington ~]$ HEAD ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/evolution-data-server-1.0.2-14.el4_7.1.src.rpm 404 File 'evolution-data-server-1.0.2-14.el4_7.1.src.rpm' not found Client-Date: Mon, 16 Mar 2009 20:37:21 GMT thanks Tru (In reply to comment #19) > as of Mon Mar 16 21:36:06 CET 2009 > the src.rpm are not available on ftp://updates.redhat.com/ Are you sure the version of HEAD you are using is not playing tricks on you? With some older HEAD version, I still can get this bogus 404 message, even though the files are on the FTP and are wget-able. Anyway, please consider preferring to follow: https://www.redhat.com/security/team/contact/ when reporting similar issues, rather than using needinfo BZ flags. the files were not there yesterday (I tried wget/HEAD/curl...) without success. They are now available, thx :) This issue was addressed in: Red Hat Enterprise Linux: http://rhn.redhat.com/errata/RHSA-2009-0354.html http://rhn.redhat.com/errata/RHSA-2009-0355.html http://rhn.redhat.com/errata/RHSA-2009-0358.html This issue was addressed in: Red Hat Enterprise Linux: http://rhn.redhat.com/errata/RHSA-2009-0354.html http://rhn.redhat.com/errata/RHSA-2009-0355.html http://rhn.redhat.com/errata/RHSA-2009-0358.html |