Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1171580 - (CVE-2014-8116) CVE-2014-8116 file: multiple denial of service issues (resource consumption)
CVE-2014-8116 file: multiple denial of service issues (resource consumption)
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20141216,repor...
: Security
Depends On: 1174608 1238984 1284826
Blocks: 1171586 1210268 1278736
  Show dependency treegraph
 
Reported: 2014-12-08 01:52 EST by Murray McAllister
Modified: 2016-06-13 07:08 EDT (History)
11 users (show)

See Also:
Fixed In Version: file 5.21
Doc Type: Bug Fix
Doc Text:
Multiple flaws were found in the way the File Information (fileinfo) extension parsed Executable and Linkable Format (ELF) files. A remote attacker could use either of these flaws to cause a PHP application using fileinfo to consume an excessive amount of system resources.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-05-11 02:49:32 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:2155 normal SHIPPED_LIVE Moderate: file security and bug fix update 2015-11-19 03:39:11 EST
Red Hat Product Errata RHSA-2016:0760 normal SHIPPED_LIVE Moderate: file security, bug fix, and enhancement update 2016-05-10 18:32:51 EDT

  None (edit)
Description Murray McAllister 2014-12-08 01:52:46 EST
Thomas Jarosch of Intra2net AG reported a number of denial of service issues (resource consumption) in the ELF parser used by file(1). Using file(1) on a specially-crafted ELF binary could lead to a denial of service (resource consumption).

Upstream fixes:

https://github.com/file/file/commit/b4c01141e5367f247b84dcaf6aefbb4e741842b8
https://github.com/file/file/commit/d7cdad007c507e6c79f51f058dd77fab70ceb9f6

Due to some regressions found when testing, the following commits are also required:

https://github.com/file/file/commit/8a905717660395b38ec4966493f6f1cf2f33946c
https://github.com/file/file/commit/90018fe22ff8b74a22fcd142225b0a00f3f12677
https://github.com/file/file/commit/6bf45271eb8e0e6577b92042ce2003ba998d1686

Refer also to bug 1174606 (CVE-2014-8117)

Acknowledgements:

Name: Thomas Jarosch (Intra2net AG)
Comment 7 Murray McAllister 2014-12-16 00:10:01 EST
Created file tracking bugs for this issue:

Affects: fedora-all [bug 1174608]
Comment 9 Fedora Update System 2015-02-18 00:55:26 EST
file-5.22-2.fc21 has been pushed to the Fedora 21 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 14 errata-xmlrpc 2015-11-19 03:09:50 EST
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2015:2155 https://rhn.redhat.com/errata/RHSA-2015-2155.html
Comment 16 errata-xmlrpc 2016-05-10 15:47:28 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2016:0760 https://rhn.redhat.com/errata/RHSA-2016-0760.html

Note You need to log in before you can comment on or make changes to this bug.