Bug 1488053 (CVE-2017-1000249)

Summary: CVE-2017-1000249 file: Stack-based buffer overflow in do_bid_note()
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: bleanhar, carnil, ccoleman, dedgar, dmcphers, harald, hhorak, jgoulding, jkaluza, jkeck, jorton, kdudka, kseifried, macermak, packaging-team-maint, rcollet, security-response-team, webstack-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: file 5.32 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-09-06 01:17:13 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1488575    
Bug Blocks: 1488057    

Description Adam Mariš 2017-09-04 08:20:22 UTC
A stack-based buffer overflow in do_bid_note() function on readelf.c was found allowing the attacker to overwrite a fixed 20 bytes stack buffer with specially crafted .notes section in ELF binary.

Upstream patch:

https://github.com/file/file/commit/35c94dc6acc418f1ad7f6241a6680e5327495793

Introduced by commit:

https://github.com/file/file/commit/9611f31313a93aa036389c5f3b15eea53510d4d1

Comment 1 Adam Mariš 2017-09-04 08:20:25 UTC
Acknowledgments:

Name: Thomas Jarosch (Intra2net AG)

Comment 2 Andrej Nemec 2017-09-05 18:02:41 UTC
References:

http://seclists.org/oss-sec/2017/q3/397

Comment 3 Andrej Nemec 2017-09-05 18:03:06 UTC
Created file tracking bugs for this issue:

Affects: fedora-all [bug 1488575]