Описание
Security update for libgsf
This update for libgsf fixes the following issues:
- CVE-2016-9888: Fixed null pointer dereference with corrupted tar files (bsc#1014609)
- CVE-2024-36474: Fixed out-of-bounds index when processing a directory via an integer overflow in the compound document binary file format parser (bsc#1231282)
- CVE-2024-42415: Fixed heap-based buffer overflow when processing the sector allocation table via an integer overflow in the compound document binary file format parser (bsc#1231283)
Список пакетов
SUSE Linux Enterprise Server 12 SP5-LTSS
SUSE Linux Enterprise Server LTSS Extended Security 12 SP5
Ссылки
- Link for SUSE-SU-2024:3770-1
- E-Mail link for SUSE-SU-2024:3770-1
- SUSE Security Ratings
- SUSE Bug 1014609
- SUSE Bug 1231282
- SUSE Bug 1231283
- SUSE CVE CVE-2016-9888 page
- SUSE CVE CVE-2024-36474 page
- SUSE CVE CVE-2024-42415 page
Описание
An error within the "tar_directory_for_file()" function (gsf-infile-tar.c) in GNOME Structured File Library before 1.14.41 can be exploited to trigger a Null pointer dereference and subsequently cause a crash via a crafted TAR file.
Затронутые продукты
Ссылки
- CVE-2016-9888
- SUSE Bug 1014609
Описание
An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
Затронутые продукты
Ссылки
- CVE-2024-36474
- SUSE Bug 1231282
Описание
An integer overflow vulnerability exists in the Compound Document Binary File format parser of v1.14.52 of the GNOME Project G Structured File Library (libgsf). A specially crafted file can result in an integer overflow that allows for a heap-based buffer overflow when processing the sector allocation table. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
Затронутые продукты
Ссылки
- CVE-2024-42415
- SUSE Bug 1231283