Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 630682 (CVE-2017-14226) - <app-text/libwpd-0.10.1-r1: remote attack against LibreOffice via heap-based buffer over-read in the WPXTableList class
Summary: <app-text/libwpd-0.10.1-r1: remote attack against LibreOffice via heap-based ...
Status: RESOLVED FIXED
Alias: CVE-2017-14226
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://bugzilla.novell.com/show_bug....
Whiteboard: B3 [noglsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2017-09-11 14:35 UTC by Aleksandr Wagner (Kivak)
Modified: 2017-10-08 14:27 UTC (History)
0 users

See Also:
Package list:
app-text/libwpd-0.10.1-r1
Runtime testing required: Yes
stable-bot: sanity-check+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Aleksandr Wagner (Kivak) 2017-09-11 14:35:58 UTC
CVE-2017-14226 (https://nvd.nist.gov/vuln/detail/CVE-2017-14226):

WP1StylesListener.cpp, WP5StylesListener.cpp, and WP42StylesListener.cpp in libwpd 0.10.1 mishandle iterators, which allows remote attackers to cause a denial of service (heap-based buffer over-read in the WPXTableList class in WPXTable.cpp). This vulnerability can be triggered in LibreOffice before 5.3.7. It may lead to suffering a remote attack against a LibreOffice application.

References:

https://bugs.documentfoundation.org/show_bug.cgi?id=112269
https://bugzilla.redhat.com/show_bug.cgi?id=1489337
https://cgit.freedesktop.org/libreoffice/core/commit/?id=dd89afa6ee8166b69e7a1e86f22616ca8fc122c9
https://sourceforge.net/p/libwpd/code/ci/0329a9c57f9b3b0efa0f09a5235dfd90236803a5/
https://sourceforge.net/p/libwpd/code/ci/f40827b3eae260ce657c67d9fecc855b09dea3c3/
https://sourceforge.net/p/libwpd/tickets/14/
Comment 1 Andreas Sturmlechner gentoo-dev 2017-09-11 17:38:44 UTC
Thanks, app-text/libwpd-0.10.1-r1 security revbump added in git commit ba7ccf31e3da9b82f8dac073ef4eece87b72a43d.

Feel free to proceed with stabilisation.
Comment 2 D'juan McDonald (domhnall) 2017-09-11 18:08:49 UTC
@arches, please test and stabilize, thank you

Daj Uan (jmbailey/mbailey_j)
Gentoo Security Padawan
Comment 3 Manuel Rüger (RETIRED) gentoo-dev 2017-09-27 10:19:51 UTC
amd64 stable
Comment 4 Thomas Deutschmann (RETIRED) gentoo-dev 2017-09-29 23:08:49 UTC
x86 stable

Last arch...


@ Maintainer(s): Please cleanup!
Comment 5 Andreas Sturmlechner gentoo-dev 2017-10-08 14:13:47 UTC
Cleanup done in git commit 185df6aaa28e52da29cc3c3e49f70f10dddc4c94
Comment 6 Aleksandr Wagner (Kivak) 2017-10-08 14:24:01 UTC
Thank you.

@Security, please vote on whether a glsa is needed or not.
Comment 7 Aaron Bauman (RETIRED) gentoo-dev 2017-10-08 14:27:31 UTC
GLSA Vote: No