Bug 659676 (CVE-2010-4262)
Summary: | CVE-2010-4262 Xfig: Stack-based buffer overflow by processing certain FIG images | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> | ||||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||
Status: | CLOSED WONTFIX | QA Contact: | |||||||
Severity: | low | Docs Contact: | |||||||
Priority: | low | ||||||||
Version: | unspecified | CC: | hdegoede, pertusus, sochotni, underground-stockholm, vdanen | ||||||
Target Milestone: | --- | Keywords: | Security | ||||||
Target Release: | --- | ||||||||
Hardware: | All | ||||||||
OS: | Linux | ||||||||
Whiteboard: | |||||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||||
Doc Text: | Story Points: | --- | |||||||
Clone Of: | Environment: | ||||||||
Last Closed: | 2016-03-31 10:11:24 UTC | Type: | --- | ||||||
Regression: | --- | Mount Type: | --- | ||||||
Documentation: | --- | CRM: | |||||||
Verified Versions: | Category: | --- | |||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||
Embargoed: | |||||||||
Bug Depends On: | 657981 | ||||||||
Bug Blocks: | |||||||||
Attachments: |
|
Description
Jan Lieskovsky
2010-12-03 12:41:10 UTC
This issue affects the versions of the xfig package, as shipped with Red Hat Enterprise Linux 4, 5, and 6. -- This issue affects the versions of the xfig package, as shipped with Fedora release of 13 and 14. Please schedule an update. Created attachment 464564 [details]
Local copy of the public PoC from [2]
CVE Request: [3] http://www.openwall.com/lists/oss-security/2010/12/03/2 Statement: (none) Created attachment 464628 [details]
Patch fixing this.
Hi All,
Here is a patch which was send to me by the suse xfig maintainer "Dr. Werner Fink" <werner> with whom I've worked together on various other xfig bugs.
I've reviewed and tested this and I can confirm it fixes the bug. I'm going to prepare a Fedora xfig update for this, with this patch.
Regards,
Hans
This has been assigned CVE-2010-4262. *** Bug 657981 has been marked as a duplicate of this bug. *** |