Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1576175 - (CVE-2018-10767) CVE-2018-10767 libgxps: Stack-based buffer overflow in calling glib in gxps_images_guess_content_type of gcontenttype.c
CVE-2018-10767 libgxps: Stack-based buffer overflow in calling glib in gxps_i...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20180505,reported=2...
: Security
Depends On: 1576176 1591114 1591115
Blocks: 1576177
  Show dependency treegraph
 
Reported: 2018-05-09 00:31 EDT by Sam Fowler
Modified: 2018-10-30 03:42 EDT (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:3140 None None None 2018-10-30 03:42 EDT

  None (edit)
Description Sam Fowler 2018-05-09 00:31:41 EDT
There is a stack-based buffer over-read in calling GLib in the function gxps_images_guess_content_type of gxps-images.c in libgxps through 0.3.0 because it does not reject negative return values from a g_input_stream_read call. A crafted input will lead to a remote denial of service attack.


Original bug:

https://bugzilla.redhat.com/show_bug.cgi?id=1575188
Comment 1 Sam Fowler 2018-05-09 00:31:59 EDT
Created libgxps tracking bugs for this issue:

Affects: fedora-all [bug 1576176]
Comment 3 Stefan Cornelius 2018-06-14 01:57:55 EDT
Acknowledgments:

Name: chenyuan (NESA Lab)
Comment 5 errata-xmlrpc 2018-10-30 03:42:30 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:3140 https://access.redhat.com/errata/RHSA-2018:3140

Note You need to log in before you can comment on or make changes to this bug.