openSUSE Security Update: Security update for file ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:3067-1 Rating: moderate References: #1009966 #1063269 #910252 #910253 #913650 #913651 #917152 #996511 Cross-References: CVE-2014-8116 CVE-2014-8117 CVE-2014-9620 CVE-2014-9621 CVE-2014-9653 Affected Products: openSUSE Leap 42.3 openSUSE Leap 42.2 ______________________________________________________________________________ An update that solves 5 vulnerabilities and has three fixes is now available. Description: The GNU file utility was updated to version 5.22. Security issues fixed: - CVE-2014-9621: The ELF parser in file allowed remote attackers to cause a denial of service via a long string. (bsc#913650) - CVE-2014-9620: The ELF parser in file allowed remote attackers to cause a denial of service via a large number of notes. (bsc#913651) - CVE-2014-9653: readelf.c in file did not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file. (bsc#917152) - CVE-2014-8116: The ELF parser (readelf.c) in file allowed remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities. (bsc#910253) - CVE-2014-8117: softmagic.c in file did not properly limit recursion, which allowed remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors. (bsc#910253) Version update to file version 5.22 * add indirect relative for TIFF/Exif * restructure elf note printing to avoid repeated messages * add note limit, suggested by Alexander Cherepanov * Bail out on partial pread()'s (Alexander Cherepanov) * Fix incorrect bounds check in file_printable (Alexander Cherepanov) * PR/405: ignore SIGPIPE from uncompress programs * change printable -> file_printable and use it in more places for safety * in ELF, instead of "(uses dynamic libraries)" when PT_INTERP is present print the interpreter name. Version update to file version 5.21 * there was an incorrect free in magic_load_buffers() * there was an out of bounds read for some pascal strings * there was a memory leak in magic lists * don't interpret strings printed from files using the current locale, convert them to ascii format first. * there was an out of bounds read in elf note reads Update to file version 5.20 * recognize encrypted CDF documents * add magic_load_buffers from Brooks Davis * add thumbs.db support Additional non-security bug fixes: * Fixed a memory corruption during rpmbuild (bsc#1063269) * Backport of a fix for an increased printable string length as found in file 5.30 (bsc#996511) * file command throws "Composite Document File V2 Document, corrupt: Can't read SSAT" error against excel 97/2003 file format. (bsc#1009966) This update was imported from the SUSE:SLE-12:Update update project. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.3: zypper in -t patch openSUSE-2017-1298=1 - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-1298=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.3 (i586 x86_64): file-5.22-10.1 file-debuginfo-5.22-10.1 file-debugsource-5.22-10.1 file-devel-5.22-10.1 file-magic-5.22-10.1 libmagic1-5.22-10.1 libmagic1-debuginfo-5.22-10.1 python-magic-5.22-10.1 - openSUSE Leap 42.3 (x86_64): libmagic1-32bit-5.22-10.1 libmagic1-debuginfo-32bit-5.22-10.1 - openSUSE Leap 42.2 (i586 x86_64): file-5.22-7.3.1 file-debuginfo-5.22-7.3.1 file-debugsource-5.22-7.3.1 file-devel-5.22-7.3.1 file-magic-5.22-7.3.1 libmagic1-5.22-7.3.1 libmagic1-debuginfo-5.22-7.3.1 python-magic-5.22-7.3.1 - openSUSE Leap 42.2 (x86_64): libmagic1-32bit-5.22-7.3.1 libmagic1-debuginfo-32bit-5.22-7.3.1 References: https://www.suse.com/security/cve/CVE-2014-8116.html https://www.suse.com/security/cve/CVE-2014-8117.html https://www.suse.com/security/cve/CVE-2014-9620.html https://www.suse.com/security/cve/CVE-2014-9621.html https://www.suse.com/security/cve/CVE-2014-9653.html https://bugzilla.suse.com/1009966 https://bugzilla.suse.com/1063269 https://bugzilla.suse.com/910252 https://bugzilla.suse.com/910253 https://bugzilla.suse.com/913650 https://bugzilla.suse.com/913651 https://bugzilla.suse.com/917152 https://bugzilla.suse.com/996511