Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1174606 - (CVE-2014-8117) CVE-2014-8117 file: denial of service issue (resource consumption)
CVE-2014-8117 file: denial of service issue (resource consumption)
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20141216,repor...
: Security
Depends On: 1174608 1238984 1284826
Blocks: 1171586 1210268 1278736
  Show dependency treegraph
 
Reported: 2014-12-15 23:41 EST by Murray McAllister
Modified: 2016-06-13 07:09 EDT (History)
11 users (show)

See Also:
Fixed In Version: file 5.21
Doc Type: Bug Fix
Doc Text:
A flaw was found in the way the File Information (fileinfo) extension parsed Executable and Linkable Format (ELF) files. A remote attacker could use this flaw to cause a PHP application using fileinfo to consume an excessive amount of system resources.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-05-11 02:49:48 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:2155 normal SHIPPED_LIVE Moderate: file security and bug fix update 2015-11-19 03:39:11 EST
Red Hat Product Errata RHSA-2016:0760 normal SHIPPED_LIVE Moderate: file security, bug fix, and enhancement update 2016-05-10 18:32:51 EDT

  None (edit)
Description Murray McAllister 2014-12-15 23:41:25 EST
Thomas Jarosch of Intra2net AG reported a denial of service issue (resource consumption) in the ELF parser used by file(1). Using file(1) on a specially-crafted ELF binary could lead to a denial of service (resource consumption).

Upstream fix:

https://github.com/file/file/commit/6f737ddfadb596d7d4a993f7ed2141ffd664a81c

Due to some regressions found when testing, the following commits are also required:

https://github.com/file/file/commit/8a905717660395b38ec4966493f6f1cf2f33946c
https://github.com/file/file/commit/90018fe22ff8b74a22fcd142225b0a00f3f12677
https://github.com/file/file/commit/6bf45271eb8e0e6577b92042ce2003ba998d1686

Refer also to bug 1171580 (CVE-2014-8116).

Acknowledgements:

Name: Thomas Jarosch (Intra2net AG)
Comment 2 Murray McAllister 2014-12-16 00:10:17 EST
Created file tracking bugs for this issue:

Affects: fedora-all [bug 1174608]
Comment 4 Fedora Update System 2015-02-18 00:55:28 EST
file-5.22-2.fc21 has been pushed to the Fedora 21 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 6 errata-xmlrpc 2015-11-19 03:09:56 EST
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2015:2155 https://rhn.redhat.com/errata/RHSA-2015-2155.html
Comment 8 errata-xmlrpc 2016-05-10 15:47:34 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2016:0760 https://rhn.redhat.com/errata/RHSA-2016-0760.html

Note You need to log in before you can comment on or make changes to this bug.