CVE-2024-42415

Publication date 3 October 2024

Last updated 21 October 2024


Ubuntu priority

Cvss 3 Severity Score

7.8 · High

Score breakdown

An integer overflow vulnerability exists in the Compound Document Binary File format parser of v1.14.52 of the GNOME Project G Structured File Library (libgsf). A specially crafted file can result in an integer overflow that allows for a heap-based buffer overflow when processing the sector allocation table. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

Read the notes from the security team

Status

Package Ubuntu Release Status
libgsf 24.10 oracular
Fixed 1.14.52-1ubuntu0.1
24.04 LTS noble
Fixed 1.14.51-2ubuntu0.1
22.04 LTS jammy
Fixed 1.14.47-1ubuntu0.1
20.04 LTS focal
Fixed 1.14.46-1ubuntu0.1
18.04 LTS bionic
Needs evaluation
16.04 LTS xenial
Needs evaluation
14.04 LTS trusty Ignored end of ESM support, was needs-triage

Notes


0xnishit

same fix as CVE-2024-36474

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
libgsf

Severity score breakdown

Parameter Value
Base score 7.8 · High
Attack vector Local
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

References

Related Ubuntu Security Notices (USN)

    • USN-7062-1
    • libgsf vulnerabilities
    • 10 October 2024
    • USN-7062-2
    • libgsf vulnerabilities
    • 21 October 2024

Other references