Bug 546580 (CVE-2009-4274)
Summary: | CVE-2009-4274 netpbm: Stack-based buffer overflow by processing X PixMap image header fields | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED ERRATA | QA Contact: | |||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | unspecified | CC: | bressers, jnovy, kreilly, psplicha, security-response-team, vdanen | ||||
Target Milestone: | --- | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | |||||||
: | 567597 (view as bug list) | Environment: | |||||
Last Closed: | 2011-12-13 07:51:56 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 563288, 567597, 760848, 760849, 760850 | ||||||
Bug Blocks: | 580448 | ||||||
Attachments: |
|
Description
Jan Lieskovsky
2009-12-11 09:57:58 UTC
This issue affects the versions of the netpbm package, as shipped with Red Hat Enterprise Linux 3, 4, and 5. This issue affects the versions of the netpbm package, as shipped with Fedora release of 10, 11, and 12. Created attachment 377777 [details]
Proposed patch
I have inspected the code and it looks like a next of the upstream thinko series. The attached patch should fix it.
Jindrich, I'd like to send this patch upstream, do you have a contact? I'm not interested in an embargo, but I don't want to make this public until they have a chance to apply the patch. Thanks. This was corrected upstream in 10.47.07 on 20091229: http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch&r1=995&r2=1076&pathrev=1076 The upstream changelog contains: xpmtoppm: fix wild pointer with color index > 127. so it is unclear whether they were aware of the security implications of this issue. I have assigned CVE-2009-4274 to this issue. Notified the oss-security mailing list. This issue has been addressed in following products: Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 5 Via RHSA-2011:1811 https://rhn.redhat.com/errata/RHSA-2011-1811.html Statement: (none) |