Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 526544 (CVE-2014-3710) - <sys-apps/file-5.20-r1: out-of-bounds read in elf note headers (CVE-2014-3710)
Summary: <sys-apps/file-5.20-r1: out-of-bounds read in elf note headers (CVE-2014-3710)
Alias: CVE-2014-3710
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major (vote)
Assignee: Gentoo Security
Whiteboard: A2 [glsa cve]
Depends on: CVE-2014-3710-php
  Show dependency tree
Reported: 2014-10-23 07:29 UTC by Agostino Sarubbo
Modified: 2017-01-17 09:21 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-10-23 07:29:27 UTC
From ${URL} :

An out-of-bounds read flaw was found in file's donote() function in the way the file utility determined the note headers of a elf file. This could possibly lead to file executable crash.

Upstream fix:

This issue was discovered by Francisco Alonso of the Red Hat Product Security.

@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 2 GLSAMaker/CVETool Bot gentoo-dev 2015-01-04 02:10:00 UTC
CVE-2014-3710 (
  The donote function in readelf.c in file through 5.20, as used in the
  Fileinfo component in PHP 5.4.34, does not ensure that sufficient note
  headers are present, which allows remote attackers to cause a denial of
  service (out-of-bounds read and application crash) via a crafted ELF file.
Comment 3 GLSAMaker/CVETool Bot gentoo-dev 2017-01-17 09:21:07 UTC
This issue was resolved and addressed in
 GLSA 201701-42 at
by GLSA coordinator Aaron Bauman (b-man).