Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1576111 - (CVE-2018-10733) CVE-2018-10733 libgxps: heap based buffer over read in ft_font_face_hash function of gxps-fonts.c
CVE-2018-10733 libgxps: heap based buffer over read in ft_font_face_hash func...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20180504,reported=2...
: Security
Depends On: 1576112 1576113 1591114 1591115
Blocks: 1576114
  Show dependency treegraph
 
Reported: 2018-05-08 17:22 EDT by Laura Pardo
Modified: 2018-10-30 03:42 EDT (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:3140 None None None 2018-10-30 03:42 EDT

  None (edit)
Description Laura Pardo 2018-05-08 17:22:03 EDT
A flaw was found in libgxps through 0.3.0. There is a heap-based buffer over-read in the function ft_font_face_hash of gxps-fonts.c. A crafted input will lead to a remote denial of service attack.


References:
https://bugzilla.redhat.com/show_bug.cgi?id=1574844

Patches:
https://git.gnome.org/browse/libgxps/commit/?id=b458226e162fe1ffe7acb4230c114a52ada5131b
https://git.gnome.org/browse/libgxps/commit/?id=133fe2a96e020d4ca65c6f64fb28a404050ebbfd
Comment 1 Laura Pardo 2018-05-08 17:22:24 EDT
Created libgxps tracking bugs for this issue:

Affects: fedora-all [bug 1576112]
Comment 4 Stefan Cornelius 2018-06-14 02:02:21 EDT
Acknowledgments:

Name: chenyuan (NESA Lab)
Comment 6 errata-xmlrpc 2018-10-30 03:42:20 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:3140 https://access.redhat.com/errata/RHSA-2018:3140

Note You need to log in before you can comment on or make changes to this bug.