Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sat, 17 Jan 2015 17:50:04 -0500 (EST)
From: cve-assign@...re.org
To: Alexander Cherepanov <ch3root@...nwall.com>
cc: oss-security@...ts.openwall.com, cve-assign@...re.org
Subject: Re: CVE request: file(1) DoS


On Fri, 16 Jan 2015, Alexander Cherepanov wrote:

> On 16.01.2015 16:15, Marc Deslauriers wrote:
>> On 2015-01-03 02:50 PM, Alexander Cherepanov wrote:
>>> On 2014-12-17 03:44, Alexander Cherepanov wrote:
>>>> There are two more DoSes fixed in ELF parser of file(1), similar to the
>>>> recent CVE-2014-8116.
>>> 
>>> These fixes were included in 5.22 release:
>>> 
>>> http://mx.gw.com/pipermail/file/2015/001660.html
>>> 
>>>> 1. Limit the number of ELF notes processed
>>>> Report: http://mx.gw.com/pipermail/file/2014/001653.html
>>>> Fix: 
>>>> https://github.com/file/file/commit/ce90e05774dd77d86cfc8dfa6da57b32816841c4
>>> 
>>> This issue seems to be introduced here:
>>> 
>>> https://github.com/file/file/commit/956a45ab1c54b11304b367056f41905e72a02380#diff-bc5c24ef9f39a5f4963ca28ecbc645b3L423
>>> 
>>> 
>>> which ended up in 5.08 release. Hence releases 5.08--5.21 are vulnerable.

Use CVE-2014-9620.



>>>> 2. Limit string printing to 100 chars
>>>> Report: http://mx.gw.com/pipermail/file/2014/001654.html
>>>> Fix: 
>>>> https://github.com/file/file/commit/65437cee25199dbd385fb35901bc0011e164276c
>>> 
>>> This issue was introduced in the following commit:
>>> 
>>> https://github.com/file/file/commit/c8451af8ab0c2e2a93ce93b9c68257d31576cc85
>>> 
>>> which ended up in 5.16 release. Hence releases 5.16--5.21 are vulnerable.
>>> 
>>>> Both problems amplified by the fact that the same section in ELF file
>>>> can be referenced and processed by file(1) multiple times. This is also
>>>> fixed in the first commit linked above.
>>>> 
>>>> Could CVE(s) please be assigned?


Use CVE-2014-9621.

---

CVE assignment team, MITRE CVE Numbering Authority M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ