Bug 1190116 (CVE-2014-9653)
Summary: | CVE-2014-9653 file: malformed elf file causes access to uninitialized memory | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vasyl Kaigorodov <vkaigoro> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | bressers, harald, jkaluza, jorton, ksrot, mmaslano, packaging-team-maint, rcollet, renerinco, security-response-team, stefan, webstack-team |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | file 5.22 | Doc Type: | Bug Fix |
Doc Text: |
A flaw was found in the way the File Information (fileinfo) extension parsed Executable and Linkable Format (ELF) files. A remote attacker could use this flaw to cause a PHP application using fileinfo to crash or disclose certain portions of server memory.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2016-05-11 06:50:38 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1190118, 1238984, 1284826 | ||
Bug Blocks: | 1190117, 1210268, 1278736 |
Description
Vasyl Kaigorodov
2015-02-06 11:43:31 UTC
Created file tracking bugs for this issue: Affects: fedora-all [bug 1190118] file-5.22-2.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report. Are there plans (or has this already been) to backport this patch to any EL releases? This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:2155 https://rhn.redhat.com/errata/RHSA-2015-2155.html Hi! It will be addressed in RHEL 6 ? (In reply to RenĂª Rinco from comment #8) > Hi! It will be addressed in RHEL 6 ? Fixing this on RHEL-6 is not a priority, since the impact is only Low. It may get fixed in the future as part of another update, but it is not planned at the moment. This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2016:0760 https://rhn.redhat.com/errata/RHSA-2016-0760.html |