First published: Tue May 08 2018(Updated: )
A flaw was found in libgxps through 0.3.0. There is a heap-based buffer over-read in the function ft_font_face_hash of gxps-fonts.c. A crafted input will lead to a remote denial of service attack. References: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - Heap Buffer Overflow in ft_font_face_hash of gxps-fonts.c" href="show_bug.cgi?id=1574844">https://bugzilla.redhat.com/show_bug.cgi?id=1574844</a> Patches: <a href="https://git.gnome.org/browse/libgxps/commit/?id=b458226e162fe1ffe7acb4230c114a52ada5131b">https://git.gnome.org/browse/libgxps/commit/?id=b458226e162fe1ffe7acb4230c114a52ada5131b</a> <a href="https://git.gnome.org/browse/libgxps/commit/?id=133fe2a96e020d4ca65c6f64fb28a404050ebbfd">https://git.gnome.org/browse/libgxps/commit/?id=133fe2a96e020d4ca65c6f64fb28a404050ebbfd</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME libgxps | <=0.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1576111 is high due to its potential for causing a remote denial of service.
You can fix REDHAT-BUG-1576111 by updating to a version of libgxps that is newer than 0.3.0.
REDHAT-BUG-1576111 is a heap-based buffer over-read vulnerability.
The affected software for REDHAT-BUG-1576111 is GNOME libgxps version 0.3.0 and earlier.
Exploiting REDHAT-BUG-1576111 could lead to a remote denial of service, affecting the availability of the application.