Bug 2235714 (CVE-2022-48554)

Summary: CVE-2022-48554 file: stack-based buffer over-read in file_copystr in funcs.c
Product: [Other] Security Response Reporter: Vipul Nair <vinair>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: agarcial, aoconnor, asegurap, bdettelb, caswilli, desktop-qa-list, fjansen, jburrell, jsherril, kaycoth, kdudka, tcarlin, tkasparek, vmihalko
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: file 5.42 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in file, a program used to identify a particular file according to the type of data contained by the file. This issue occurs when processing a specially crafted file, causing a stack-based buffer over-read, resulting in an application crash.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2235715, 2235718, 2235719    
Bug Blocks: 2235716    

Description Vipul Nair 2023-08-29 14:08:58 UTC
File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: "File" is the name of an Open Source project.

Reference:
https://bugs.astron.com/view.php?id=310

Upstream patch:
https://github.com/file/file/commit/497aabb29cd08d2a5aeb63e45798d65fcbe03502

Comment 1 Vipul Nair 2023-08-29 14:09:17 UTC
Created file tracking bugs for this issue:

Affects: fedora-all [bug 2235715]

Comment 7 errata-xmlrpc 2024-04-30 11:01:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:2512 https://access.redhat.com/errata/RHSA-2024:2512