Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 538660 (CVE-2014-9652)

Summary: <sys-apps/file-5.21: out of bounds read in mconvert()
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: normal CC: base-system
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://bugs.gw.com/view.php?id=398
See Also: http://bugs.gw.com/view.php?id=398
https://bugzilla.redhat.com/show_bug.cgi?id=1188599
Whiteboard: A3 [glsa cve]
Package list:
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2015-02-03 11:57:38 UTC
From ${URL} :

Out of bounds memory read was reported in file utility [1], which also affects PHP fileinfo module.
Upstream fix that resolves this for file utility:
https://github.com/file/file/commit/59e63838913eee47f5c120a6c53d4565af638158

PHP upstream fix:
https://github.com/php/php-src/commit/ede59c8feb4b80e1b94e4abdaa0711051e2912ab

[1]: http://bugs.gw.com/view.php?id=398


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2015-06-20 23:50:32 UTC
CVE-2014-9652 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9652):
  The mconvert function in softmagic.c in file before 5.21, as used in the
  Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x
  before 5.6.5, does not properly handle a certain string-length field during
  a copy of a truncated version of a Pascal string, which might allow remote
  attackers to cause a denial of service (out-of-bounds memory access and
  application crash) via a crafted file.
Comment 2 SpanKY gentoo-dev 2016-04-11 17:23:28 UTC
5.22 is stable for everyone now
Comment 3 Thomas Deutschmann (RETIRED) gentoo-dev 2016-11-21 16:50:33 UTC
@ Security: Waiting for GLSA...
Comment 4 GLSAMaker/CVETool Bot gentoo-dev 2017-01-17 09:21:14 UTC
This issue was resolved and addressed in
 GLSA 201701-42 at https://security.gentoo.org/glsa/201701-42
by GLSA coordinator Aaron Bauman (b-man).