Bug 913651 - (CVE-2014-9620) VUL-1: CVE-2014-9620 file: limit the number of ELF notes processed
(CVE-2014-9620)
VUL-1: CVE-2014-9620 file: limit the number of ELF notes processed
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P4 - Low : Minor
: ---
Assigned To: Dr. Werner Fink
Security Team bot
https://smash.suse.de/issue/112751/
CVSSv2:NVD:CVE-2014-9620:5.0:(AV:N/AC...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2015-01-19 10:14 UTC by Victor Pereira
Modified: 2019-02-24 07:39 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Victor Pereira 2015-01-19 10:14:13 UTC
rh#1180639

It was reported that file versions prior to 5.22 did not limit the number of ELF notes processed, which could lead to a local resource exhaustion.

Upstream fix:
https://github.com/file/file/commit/ce90e05774dd77d86cfc8dfa6da57b32816841c4

This issue seems to be introduced here:
https://github.com/file/file/commit/956a45ab1c54b11304b367056f41905e72a02380#diff-bc5c24ef9f39a5f4963ca28ecbc645b3L423
which ended up in 5.08 release.


References:
http://mx.gw.com/pipermail/file/2014/001653.html
https://bugzilla.redhat.com/show_bug.cgi?id=1180639
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9620
http://seclists.org/oss-sec/2015/q1/164
Comment 1 Swamp Workflow Management 2015-01-19 23:03:42 UTC
bugbot adjusting priority
Comment 2 Bernhard Wiedemann 2015-01-20 09:00:10 UTC
This is an autogenerated message for OBS integration:
This bug (913651) was mentioned in
https://build.opensuse.org/request/show/282032 Factory / file
Comment 3 Bernhard Wiedemann 2015-01-20 12:00:12 UTC
This is an autogenerated message for OBS integration:
This bug (913651) was mentioned in
https://build.opensuse.org/request/show/282049 Factory / file
Comment 4 Dr. Werner Fink 2015-02-13 14:15:46 UTC
OK ... this leads to the fact that OS 13.1 amd 13.2 are affected
Comment 5 Dr. Werner Fink 2015-02-13 15:14:37 UTC
(In reply to Victor Pereira from comment #0)

Please provide a reproducer as I've seen that the commit does not apply in file 5.19
Comment 6 Bernhard Wiedemann 2015-02-18 15:00:22 UTC
This is an autogenerated message for OBS integration:
This bug (913651) was mentioned in
https://build.opensuse.org/request/show/286645 13.1 / file
https://build.opensuse.org/request/show/286646 13.2 / file
Comment 7 Victor Pereira 2015-06-03 20:17:03 UTC
there isnt a reproducer, sorry.
Comment 9 Swamp Workflow Management 2017-11-22 20:12:25 UTC
SUSE-SU-2017:3048-1: An update that solves 5 vulnerabilities and has three fixes is now available.

Category: security (moderate)
Bug References: 1009966,1063269,910252,910253,913650,913651,917152,996511
CVE References: CVE-2014-8116,CVE-2014-8117,CVE-2014-9620,CVE-2014-9621,CVE-2014-9653
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP3 (src):    file-5.22-10.3.1, python-magic-5.22-10.3.1
SUSE Linux Enterprise Software Development Kit 12-SP2 (src):    file-5.22-10.3.1, python-magic-5.22-10.3.1
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src):    file-5.22-10.3.1
SUSE Linux Enterprise Server 12-SP3 (src):    file-5.22-10.3.1
SUSE Linux Enterprise Server 12-SP2 (src):    file-5.22-10.3.1
SUSE Linux Enterprise Desktop 12-SP3 (src):    file-5.22-10.3.1
SUSE Linux Enterprise Desktop 12-SP2 (src):    file-5.22-10.3.1
SUSE Container as a Service Platform ALL (src):    file-5.22-10.3.1
OpenStack Cloud Magnum Orchestration 7 (src):    file-5.22-10.3.1
Comment 10 Swamp Workflow Management 2017-11-23 23:08:43 UTC
openSUSE-SU-2017:3067-1: An update that solves 5 vulnerabilities and has three fixes is now available.

Category: security (moderate)
Bug References: 1009966,1063269,910252,910253,913650,913651,917152,996511
CVE References: CVE-2014-8116,CVE-2014-8117,CVE-2014-9620,CVE-2014-9621,CVE-2014-9653
Sources used:
openSUSE Leap 42.3 (src):    file-5.22-10.1, python-magic-5.22-10.1
openSUSE Leap 42.2 (src):    file-5.22-7.3.1, python-magic-5.22-7.3.1
Comment 11 Dr. Werner Fink 2018-09-18 09:27:12 UTC
Update out there