Mageia 2024-0337: libgsf Security Advisory Updates
Summary
An integer overflow vulnerability exists in the Compound Document Binary
File format parser of the GNOME Project G Structured File Library
(libgsf) version v1.14.52. A specially crafted file can result in an
integer overflow when processing the directory from the file that allows
for an out-of-bounds index to be used when reading and writing to an
array. This can lead to arbitrary code execution. An attacker can
provide a malicious file to trigger this vulnerability. (CVE-2024-36474)
An integer overflow vulnerability exists in the Compound Document Binary
File format parser of v1.14.52 of the GNOME Project G Structured File
Library (libgsf). A specially crafted file can result in an integer
overflow that allows for a heap-based buffer overflow when processing
the sector allocation table. This can lead to arbitrary code execution.
An attacker can provide a malicious file to trigger this vulnerability.
(CVE-2024-42415)
References
- https://bugs.mageia.org/show_bug.cgi?id=33620
- https://lwn.net/Articles/993121/
- https://ubuntu.com/security/notices/USN-7062-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36474
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42415
Resolution
MGASA-2024-0337 - Updated libgsf packages fix security vulnerabilities
SRPMS
- 9/core/libgsf-1.14.50-1.1.mga9