Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 526544 (CVE-2014-3710)

Summary: <sys-apps/file-5.20-r1: out-of-bounds read in elf note headers (CVE-2014-3710)
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: major CC: base-system
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://github.com/file/file/commit/39c7ac1106be844a5296d3eb5971946cc09ffda0
See Also: https://bugzilla.redhat.com/show_bug.cgi?id=1155071
Whiteboard: A2 [glsa cve]
Package list:
Runtime testing required: ---
Bug Depends on: 530820    
Bug Blocks:    

Description Agostino Sarubbo gentoo-dev 2014-10-23 07:29:27 UTC
From ${URL} :

An out-of-bounds read flaw was found in file's donote() function in the way the file utility determined the note headers of a elf file. This could possibly lead to file executable crash.

Upstream fix:
https://github.com/file/file/commit/39c7ac1106be844a5296d3eb5971946cc09ffda0

Acknowledgements:
This issue was discovered by Francisco Alonso of the Red Hat Product Security.


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 2 GLSAMaker/CVETool Bot gentoo-dev 2015-01-04 02:10:00 UTC
CVE-2014-3710 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3710):
  The donote function in readelf.c in file through 5.20, as used in the
  Fileinfo component in PHP 5.4.34, does not ensure that sufficient note
  headers are present, which allows remote attackers to cause a denial of
  service (out-of-bounds read and application crash) via a crafted ELF file.
Comment 3 GLSAMaker/CVETool Bot gentoo-dev 2017-01-17 09:21:07 UTC
This issue was resolved and addressed in
 GLSA 201701-42 at https://security.gentoo.org/glsa/201701-42
by GLSA coordinator Aaron Bauman (b-man).