Page MenuHomeSolus

Update file to 5.32 to address CVE-2017-1000249
ClosedPublic

Authored by kyrios123 on Sep 2 2017, 5:16 PM.
Referenced Files
F11013231: D935.diff
Fri, Aug 4, 11:20 AM
F10979066: D935.diff
Sat, Jul 22, 10:04 PM
F10792846: D935.diff
May 27 2023, 8:41 AM
F10705426: D935.diff
Apr 26 2023, 9:15 AM

Details

Summary

file contains a stack based buffer overflow when parsing a
specially crafted input file.

The issue lets an attacker overwrite a fixed 20 bytes stack buffer
with a specially crafted .notes section in an ELF binary file.

  • Always reset state in {file,buffer}_apprentice
  • pickier parsing of numeric values in magic files.
  • PR/615 add magic_getflags()

Signed-off-by: Pierre-Yves <pyu@riseup.net>

Test Plan
$ file file-5.32-11-1-x86_64.eopkg 
file-5.32-11-1-x86_64.eopkg: Zip archive data, at least v2.0 to extract
$ file package.yml 
package.yml: ASCII text

Diff Detail

Repository
R750 file
Lint
Lint Not Applicable
Unit
Tests Not Applicable

Event Timeline

DataDrake added a subscriber: DataDrake.

LGTM. Thanks!

This revision is now accepted and ready to land.Sep 2 2017, 5:20 PM
sunnyflunk retitled this revision from Update file to 5.32 to Update file to 5.32 to address CVE-2017-1000249.Sep 6 2017, 2:45 AM
sunnyflunk edited the summary of this revision. (Show Details)
sunnyflunk edited the test plan for this revision. (Show Details)
sunnyflunk added a subscriber: sunnyflunk.

Publishing (and redone the git log) as now a security update

This revision was automatically updated to reflect the committed changes.

Publishing (and redone the git log) as now a security update

Is it normal that it wasn't published on the master branch ?

@kyrios123 No, @sunnyflunk must've forgotten to arc land the patch and was working off the arc patch branch.

I went ahead and merged it into the master branch.