Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1416410 - (CVE-2016-10164) CVE-2016-10164 libXpm: Out-of-bounds write in XPM extension parsing
CVE-2016-10164 libXpm: Out-of-bounds write in XPM extension parsing
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20161212,repor...
: Security
Depends On: 1416442 1431946
Blocks: 1416412
  Show dependency treegraph
 
Reported: 2017-01-25 07:56 EST by Andrej Nemec
Modified: 2017-08-01 12:04 EDT (History)
3 users (show)

See Also:
Fixed In Version: libXpm 3.5.12
Doc Type: If docs needed, set a value
Doc Text:
An integer overflow flaw leading to a heap-based buffer overflow was found in libXpm. An attacker could use this flaw to crash an application using libXpm via a specially crafted XPM file.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:1865 normal SHIPPED_LIVE Moderate: X.org X11 libraries security, bug fix and enhancement update 2017-08-01 13:50:43 EDT

  None (edit)
Description Andrej Nemec 2017-01-25 07:56:31 EST
An out of boundary write has been found in libXpm which can be exploited by an attacker through maliciously crafted XPM files.

The affected code is prone to two 32 bit integer overflows while parsing extensions: the amount of extensions and their concatenated length.

References:

http://seclists.org/oss-sec/2017/q1/167

Upstream patch:

https://cgit.freedesktop.org/xorg/lib/libXpm/commit/?id=d1167418f0fd02a27f617ec5afd6db053afbe185
Comment 1 Andrej Nemec 2017-01-25 08:52:17 EST
Created libXpm tracking bugs for this issue:

Affects: fedora-24 [bug 1416442]
Comment 4 errata-xmlrpc 2017-08-01 12:04:12 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:1865 https://access.redhat.com/errata/RHSA-2017:1865

Note You need to log in before you can comment on or make changes to this bug.