Bugzilla – Bug 902367
VUL-0: CVE-2014-3710: file: out-of-bounds read in elf note headers
Last modified: 2018-10-19 18:29:36 UTC
CVE-2014-3710 An out-of-bounds read flaw was found in file's donote() function in the way the file utility determined the note headers of a elf file. This could possibly lead to file executable crash. References: https://github.com/file/file/commit/39c7ac1106be844a5296d3eb5971946cc09ffda0 (upstream fix) https://bugzilla.redhat.com/show_bug.cgi?id=1155071 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3710 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710
Is this really a VUL-0 ... nevertheless I've available file/Update> ll total 16 drwxr-xr-x 3 werner suse 738 Oct 23 14:05 SLE-10-SP3 drwxr-xr-x 3 werner suse 738 Oct 23 14:03 SLE-10-SP4 drwxr-xr-x 3 werner suse 4096 Oct 23 14:01 SLE-11 drwxr-xr-x 3 werner suse 690 Oct 23 14:07 SLE-9 drwxr-xr-x 3 werner suse 4096 Oct 23 14:12 openSUSE_12.3 drwxr-xr-x 3 werner suse 4096 Oct 23 14:01 openSUSE_13.1 drwxr-xr-x 3 werner suse 4096 Oct 23 14:10 openSUSE_13.2 file/Update> foreach d (SLE-* openSUSE_1*) foreach? pushd $d foreach? osc st foreach? popd foreach? end /usr/src/werner/file/Update/SLE-10-SP3 /usr/src/werner/file/Update M file-4.03-tex.dif A file-4.24-CVE-2014-3710.patch M file.changes M file.spec /usr/src/werner/file/Update /usr/src/werner/file/Update/SLE-10-SP4 /usr/src/werner/file/Update A file-4.24-CVE-2014-3710.patch M file.changes M file.spec /usr/src/werner/file/Update /usr/src/werner/file/Update/SLE-11 /usr/src/werner/file/Update M file-4.03-tex.dif A file-4.24-CVE-2014-3710.patch M file.changes M file.spec /usr/src/werner/file/Update /usr/src/werner/file/Update/SLE-9 /usr/src/werner/file/Update M file-4.03-tex.dif A file-4.24-CVE-2014-3710.patch M file.changes M file.spec /usr/src/werner/file/Update /usr/src/werner/file/Update/openSUSE_12.3 /usr/src/werner/file/Update A file-5.20-CVE-2014-3710.patch M file.changes M file.spec /usr/src/werner/file/Update /usr/src/werner/file/Update/openSUSE_13.1 /usr/src/werner/file/Update A file-5.20-CVE-2014-3710.patch M file.changes M file.spec /usr/src/werner/file/Update /usr/src/werner/file/Update/openSUSE_13.2 /usr/src/werner/file/Update A file-5.20-CVE-2014-3710.patch M file.changes M file.spec /usr/src/werner/file/Update
bugbot adjusting priority
Ping!?
An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2014-11-21. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/59591
Thank you for your submits, I started a SWAMP. This was fixed in file 5.20, so SLE 12 needs this fix also.
This is an autogenerated message for OBS integration: This bug (902367) was mentioned in https://build.opensuse.org/request/show/262138 12.3 / file https://build.opensuse.org/request/show/262139 13.1 / file
SLE-10-SP3 46374 State:review By:licensedigger When:2014-11-18T10:55:06 SLE-10-SP4 46373 State:review By:licensedigger When:2014-11-18T10:45:07 SLE-11 46375 State:review By:licensedigger When:2014-11-18T10:55:12 openSUSE_12.3 262138 State:new By:maintbot When:2014-11-18T10:59:11 openSUSE_13.1 262139 State:new By:maintbot When:2014-11-18T10:59:12 openSUSE_13.2 262142 State:review By:WernerFink When:2014-11-18T11:04:21
For SLES-12 I get also an error Update/SLE-12> isc submitreq home:WernerFink:branches:SUSE:SLE-12:Update file.SUSE_SLE-12_Update SUSE:SLE-12:Update file WARNING: WARNING: Project does not accept submit request, request to open a NEW maintenance incident instead WARNING: Server returned an error: HTTP Error 400: Bad Request Maintenance incident requests have to go to projects of type maintenance or maintenance_incident but I *have* done isc branch -M SUSE:SLE-12:GA file which indeed does create project and package in maintenance mode!
(In reply to Dr. Werner Fink from comment #12) Your osc is probably to old. Please try it with the latest version.
This is an autogenerated message for OBS integration: This bug (902367) was mentioned in https://build.opensuse.org/request/show/262142 13.2 / file
(In reply to Dr. Werner Fink from comment #12) About which version do we talk? I've tried 0.138
OK with 0.149 it works ... SR#46383
SUSE-SU-2014:1473-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 902367 CVE References: CVE-2014-3710 Sources used: SUSE Linux Enterprise Software Development Kit 11 SP3 (src): file-4.24-43.27.1, python-magic-4.24-43.27.1 SUSE Linux Enterprise Server 11 SP3 for VMware (src): file-4.24-43.27.1 SUSE Linux Enterprise Server 11 SP3 (src): file-4.24-43.27.1 SUSE Linux Enterprise Desktop 11 SP3 (src): file-4.24-43.27.1
openSUSE-SU-2014:1516-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 902367 CVE References: CVE-2014-3710 Sources used: openSUSE 13.2 (src): file-5.19-3.4.1, python-magic-5.19-3.4.1 openSUSE 13.1 (src): file-5.15-4.24.1, python-magic-5.15-4.24.1 openSUSE 12.3 (src): file-5.11-12.27.1, python-magic-5.11-12.27.1
SUSE-SU-2014:1555-1: An update that solves one vulnerability and has one errata is now available. Category: security (moderate) Bug References: 888308,902367 CVE References: CVE-2014-3710 Sources used: SUSE Linux Enterprise Software Development Kit 12 (src): file-5.19-5.2, python-magic-5.19-5.3 SUSE Linux Enterprise Server 12 (src): file-5.19-5.2 SUSE Linux Enterprise Desktop 12 (src): file-5.19-5.2
This is an autogenerated message for OBS integration: This bug (902367) was mentioned in https://build.opensuse.org/request/show/265566 Factory / file
Can be closed again.
> Can be closed again. For real.