| Summary: | unrtf denial of service issues fixed upstream in 0.21.8 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | olchal, ottoleipala1, sysadmin-bugs |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/629243/ | ||
| Whiteboard: | has_procedure advisory MGA4-64-OK MGA4-32-OK | ||
| Source RPM: | unrtf-0.21.7-1.mga4.src.rpm | CVE: | |
| Status comment: | |||
| Attachments: | RTF sample test file | ||
|
Description
David Walser
2014-12-23 19:21:05 CET
Created attachment 5758 [details]
RTF sample test file
Testing on Mageia 4x32 real hardware
From current package :
--------------------
unrtf-0.21.7-1.mga4
First with PoC
$ perl -e 'print "{" x 100000' > test2.rtf
$ unrtf test2.rtf
Erreur de segmentation
Then with a rtfsampletest.rtf written in LibreOffice (in attachment)
$ unrtf rtfsampletest.rtf
outputs in html format. If output copied to a html file, opens in browser ok.
$ unrtf --text rtfsampletest.rtf
outputs in ASCII characters
To updated testing package :
--------------------------
unrtf-0.21.8-1.mga4
$ perl -e 'print "{" x 100000' > test3.rtf
$ unrtf test3.rtf
Warning: Max group depth reached (...)
gives a warning but no segmentation fault.
$ unrtf rtfsampletest.rtf
outputs in html format. If output copied to a html file, opens in browser ok.
$ unrtf --text rtfsampletest.rtf
### Translation from RTF performed by UnRTF, version 0.21.8
### font table contains 13 fonts total
### creation date: 24 December 2014 10:22
### revision date:
### last printed:
### comments: LibreOffice
-----------------
Error (line 71): output personality lacks sufficient font size change capability
It can't output my sample rtf test in ASCII characters anymore.
New version resolves the bug (segfault) but produces a regression on my installation.CC:
(none) =>
olchal Thanks Olivier. Would you mind reporting the regression upstream? http://savannah.gnu.org/projects/unrtf/ Whiteboard:
(none) =>
feedback (In reply to David Walser from comment #2) > Thanks Olivier. > > Would you mind reporting the regression upstream? > http://savannah.gnu.org/projects/unrtf/ Done David ! Thanks Olivier! http://savannah.gnu.org/bugs/?43888 Regression fixed upstream in 0.21.9. Freeze push requested for Cauldron. unrtf-0.21.9-1.mga4 from unrtf-0.21.9-1.mga4.src.rpm uploaded for Mageia 4. Whiteboard:
feedback =>
(none) Testing done with Mga4 64&32 no issues found i validate this. Sysadmins push to updates. CC:
(none) =>
ozkyster, sysadmin-bugs
Otto Leipälä
2015-01-09 13:05:08 CET
Keywords:
(none) =>
validated_update Do you want to add anything to the advisory David? No, this one's ready to go. They do need to push it in Cauldron also. Advisory from comment 0 with srpm from comment 5 uploaded. Whiteboard:
MGA4-64-OK MGA4-32-OK =>
has_procedure advisory MGA4-64-OK MGA4-32-OK An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2015-0016.html Status:
NEW =>
RESOLVED
David Walser
2015-01-12 19:25:38 CET
URL:
(none) =>
http://lwn.net/Vulnerabilities/629243/ |