MGASA-2024-0337 - Updated libgsf packages fix security vulnerabilities

Publication date: 27 Oct 2024
URL: https://advisories.mageia.org/MGASA-2024-0337.html
Type: security
Affected Mageia releases: 9
CVE: CVE-2024-36474,
     CVE-2024-42415

An integer overflow vulnerability exists in the Compound Document Binary
File format parser of the GNOME Project G Structured File Library
(libgsf) version v1.14.52. A specially crafted file can result in an
integer overflow when processing the directory from the file that allows
for an out-of-bounds index to be used when reading and writing to an
array. This can lead to arbitrary code execution. An attacker can
provide a malicious file to trigger this vulnerability. (CVE-2024-36474)
An integer overflow vulnerability exists in the Compound Document Binary
File format parser of v1.14.52 of the GNOME Project G Structured File
Library (libgsf). A specially crafted file can result in an integer
overflow that allows for a heap-based buffer overflow when processing
the sector allocation table. This can lead to arbitrary code execution.
An attacker can provide a malicious file to trigger this vulnerability.
(CVE-2024-42415)

References:
- https://bugs.mageia.org/show_bug.cgi?id=33620
- https://lwn.net/Articles/993121/
- https://ubuntu.com/security/notices/USN-7062-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36474
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42415

SRPMS:
- 9/core/libgsf-1.14.50-1.1.mga9

Mageia 2024-0337: libgsf Security Advisory Updates

An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52

Summary

An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. (CVE-2024-36474) An integer overflow vulnerability exists in the Compound Document Binary File format parser of v1.14.52 of the GNOME Project G Structured File Library (libgsf). A specially crafted file can result in an integer overflow that allows for a heap-based buffer overflow when processing the sector allocation table. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. (CVE-2024-42415)

References

- https://bugs.mageia.org/show_bug.cgi?id=33620

- https://lwn.net/Articles/993121/

- https://ubuntu.com/security/notices/USN-7062-1

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36474

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42415

Resolution

MGASA-2024-0337 - Updated libgsf packages fix security vulnerabilities

SRPMS

- 9/core/libgsf-1.14.50-1.1.mga9

Severity
Publication date: 27 Oct 2024
URL: https://advisories.mageia.org/MGASA-2024-0337.html
Type: security
CVE: CVE-2024-36474, CVE-2024-42415

Related News