Bug 217949 - CVE-2006-4514 libgsf heap overflow
Summary: CVE-2006-4514 libgsf heap overflow
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 4
Classification: Red Hat
Component: libgsf
Version: 4.0
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
: ---
Assignee: Caolan McNamara
QA Contact:
URL:
Whiteboard: source=idefense,reported=20061130,pub...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2006-11-30 21:08 UTC by Josh Bressers
Modified: 2007-11-30 22:07 UTC (History)
1 user (show)

Fixed In Version: RHSA-2007-0011
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2007-01-11 11:27:16 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)
Patch extracted from upstream CVS (622 bytes, patch)
2006-11-30 21:08 UTC, Josh Bressers
no flags Details | Diff


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2007:0011 0 normal SHIPPED_LIVE Moderate: libgsf security update 2007-01-11 11:27:12 UTC

Description Josh Bressers 2006-11-30 21:08:28 UTC
infamous41md discovered a heap overflow in libgsf.  When a specially crafted OLE
document is opened, it can overflow a buffer possibly leading to arbitrary code
execution.

This flaw should also affect RHEL3

Comment 1 Josh Bressers 2006-11-30 21:08:28 UTC
Created attachment 142527 [details]
Patch extracted from upstream CVS

Comment 2 Caolan McNamara 2006-12-01 10:27:58 UTC
Built as...

RHEL-4: libgsf-1.10.1-2
RHEL-3: libgsf-1.6.0-5

Comment 3 Caolan McNamara 2006-12-05 16:20:39 UTC
RHEL-3: libgsf-1.6.0-6 to add extra BuildRequires so as to get the same output
rpms through brew as through beehive

Comment 4 Caolan McNamara 2006-12-05 17:10:19 UTC
ah, screw it, still not sufficient for brewization, but...

RHEL-3: libgsf-1.6.0-7 looks good...

i.e. rpm -qRp libgsf-1.6.0-7.x86_64.rpm
glib2 >= 2.0.0
libORBit-2.so.0()(64bit)  
libbonobo-2.so.0()(64bit)  
libbonobo-activation.so.4()(64bit)  
libc.so.6()(64bit)  
libc.so.6(GLIBC_2.2.5)(64bit)  
libdl.so.2()(64bit)  
libglib-2.0.so.0()(64bit)  
libgmodule-2.0.so.0()(64bit)  
libgnomevfs-2.so.0()(64bit)  
libgobject-2.0.so.0()(64bit)  
libgsf-1.so.1()(64bit)  
libgthread-2.0.so.0()(64bit)  
liblinc.so.1()(64bit)  
libm.so.6()(64bit)  
libpthread.so.0()(64bit)  
libpthread.so.0(GLIBC_2.2.5)(64bit)  
libxml2.so.2()(64bit)  
libz.so.1()(64bit)  
rpmlib(CompressedFileNames) <= 3.0.4-1
rpmlib(PayloadFilesHavePrefix) <= 4.0-1


as opposed to
rpm -qRp libgsf-1.6.0-5.x86_64.rpm
glib2 >= 2.0.0
libc.so.6()(64bit)  
libc.so.6(GLIBC_2.2.5)(64bit)  
libgsf-1.so.1()(64bit)  
rpmlib(CompressedFileNames) <= 3.0.4-1
rpmlib(PayloadFilesHavePrefix) <= 4.0-1


Comment 7 Jan Hutař 2006-12-15 09:52:33 UTC
TPS run result adds:
TPS found some failures in tps-srpmtest.log of job 14637:
  re-ran by hand and seems OK (no failures)
TPS jobs 14634 and 14635 are still in "NOT_STARTED":
  14634: i386_3es: stable system for testing not available, will run it later 
but don't expect any problems
  14635: ia64_3es: re-ran by hand and PASS

Comment 8 Jan Hutař 2006-12-15 13:33:42 UTC
Hello,
trying to test using "How to test" from RHSA-2006:0752, but RHEL3 contains 
librsvg2-2.2.3-6 which doesn't include rsvg-view:

# rpm -q librsvg2
librsvg2-2.2.3-6.el3.1.ia64
# rpm -ql librsvg2 | grep bin
/usr/bin/rsvg

Is following command enought to test this bug?:

$ rsvg email.svgz email.png
$ eog email.png   # to check output

Comment 9 Caolan McNamara 2006-12-15 13:38:11 UTC
yes, that should be sufficient to show that rsvg can still open such compressed
stream storages through libgsf

Comment 14 Red Hat Bugzilla 2007-01-11 11:27:16 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2007-0011.html



Note You need to log in before you can comment on or make changes to this bug.