Opened 6 months ago

Closed 6 months ago

Last modified 6 months ago

#20463 closed enhancement (fixed)

libgsf-1.14.53

Reported by: Bruce Dubbs Owned by: Bruce Dubbs
Priority: high Milestone: 12.3
Component: BOOK Version: git
Severity: normal Keywords:
Cc:

Description

New point version.

Change History (5)

comment:1 by Bruce Dubbs, 6 months ago

Owner: changed from blfs-book to Bruce Dubbs
Status: newassigned

comment:2 by Bruce Dubbs, 6 months ago

libgsf 1.14.53

  • Compilation fixes for libxml 2.13
  • Fix ABR in gsf-vba-dump.
  • Teach gsf (the tool) to handle odf properties.
  • Fix integer overflows affecting memory allocation. #34
  • Add missing "DocumentStatus" ole2 property. #35
  • Avoid some undefined C behaviour in overflow checks. (Part of merge request 16.)

Note: The patch is no longer needed.

comment:3 by Bruce Dubbs, 6 months ago

Resolution: fixed
Status: assignedclosed

Fixed at commits

80907b72c9 Update to btrfs-progs-v6.11.
3ec6feeaa3 Update to libgsf-1.14.53.
62516bedb6 Update to Python3-3.12.7.
23423eed22 Update to sentry_sdk-2.15.0.
229c1690cc Update to xkeyboard-config-2.43.
3b199d0d2a Update to hwdata-0.388.

comment:4 by Douglas R. Reno, 6 months ago

Priority: normalhigh

This one turned out to be a security update. It fixes two vulnerabilities, both of which are integer overflows:

  • CVE-2024-42415

and

  • CVE-2024-36474

More details on these vulnerabilities can be found here:

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2069 and https://talosintelligence.com/vulnerability_reports/TALOS-2024-2068

The upstream bug report at GNOME is https://gitlab.gnome.org/GNOME/libgsf/-/issues/34

At least one of the issues is 8.4/10 High, so we'll go with High for this and I'll file an advisory after I'm done reading the rest of my mail.

comment:5 by Douglas R. Reno, 6 months ago

SA-12.2-018 has been issued for this vulnerability.

This one will definitely make it into the email I send out once I'm done with my security tickets. Here's a statement from Red Hat:

This vulnerability should be classified as important severity rather than moderate due to the potential impact of the integer overflow, which can lead to arbitrary code execution. The flaw arises in the core parsing logic of the Compound Document Binary File (CDF) format within libgsf, a widely used library for handling structured file formats. An attacker can exploit this by crafting a malicious file that triggers an out-of-bounds memory write, leading to memory corruption. Since this can result in control over execution flow, the vulnerability opens up the risk for remote code execution in applications that rely on libgsf for file handling, making it more dangerous than a moderate-level issue. Additionally, as CDF formats are used in common file types (e.g., Microsoft Office documents), this vulnerability could easily be weaponized through social engineering attacks such as phishing.

Note: See TracTickets for help on using tickets.