SUSE-SU-2017:3048-1: moderate: Security update for file
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Wed Nov 22 13:11:33 MST 2017
SUSE Security Update: Security update for file
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3048-1
Rating: moderate
References: #1009966 #1063269 #910252 #910253 #913650
#913651 #917152 #996511
Cross-References: CVE-2014-8116 CVE-2014-8117 CVE-2014-9620
CVE-2014-9621 CVE-2014-9653
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Desktop 12-SP3
SUSE Linux Enterprise Desktop 12-SP2
SUSE Container as a Service Platform ALL
OpenStack Cloud Magnum Orchestration 7
______________________________________________________________________________
An update that solves 5 vulnerabilities and has three fixes
is now available.
Description:
The GNU file utility was updated to version 5.22.
Security issues fixed:
- CVE-2014-9621: The ELF parser in file allowed remote attackers to cause
a denial of service via a long string. (bsc#913650)
- CVE-2014-9620: The ELF parser in file allowed remote attackers to cause
a denial of service via a large number of notes. (bsc#913651)
- CVE-2014-9653: readelf.c in file did not consider that pread calls
sometimes read only a subset of the available data, which allows remote
attackers to cause a denial of service (uninitialized memory access) or
possibly have unspecified other impact via a crafted ELF file.
(bsc#917152)
- CVE-2014-8116: The ELF parser (readelf.c) in file allowed remote
attackers to cause a denial of service (CPU consumption or crash) via a
large number of (1) program or (2) section headers or (3) invalid
capabilities. (bsc#910253)
- CVE-2014-8117: softmagic.c in file did not properly limit recursion,
which allowed remote attackers to cause a denial of service (CPU
consumption or crash) via unspecified vectors. (bsc#910253)
Version update to file version 5.22
* add indirect relative for TIFF/Exif
* restructure elf note printing to avoid repeated messages
* add note limit, suggested by Alexander Cherepanov
* Bail out on partial pread()'s (Alexander Cherepanov)
* Fix incorrect bounds check in file_printable (Alexander Cherepanov)
* PR/405: ignore SIGPIPE from uncompress programs
* change printable -> file_printable and use it in more places for safety
* in ELF, instead of "(uses dynamic libraries)" when PT_INTERP is present
print the interpreter name.
Version update to file version 5.21
* there was an incorrect free in magic_load_buffers()
* there was an out of bounds read for some pascal strings
* there was a memory leak in magic lists
* don't interpret strings printed from files using the current locale,
convert them to ascii format first.
* there was an out of bounds read in elf note reads
Update to file version 5.20
* recognize encrypted CDF documents
* add magic_load_buffers from Brooks Davis
* add thumbs.db support
Additional non-security bug fixes:
* Fixed a memory corruption during rpmbuild (bsc#1063269)
* Backport of a fix for an increased printable string length as found in
file 5.30 (bsc#996511)
* file command throws "Composite Document File V2 Document, corrupt: Can't
read SSAT" error against excel 97/2003 file format. (bsc#1009966)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP3:
zypper in -t patch SUSE-SLE-SDK-12-SP3-2017-1881=1
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-1881=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-1881=1
- SUSE Linux Enterprise Server 12-SP3:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-1881=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-1881=1
- SUSE Linux Enterprise Desktop 12-SP3:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2017-1881=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-1881=1
- SUSE Container as a Service Platform ALL:
zypper in -t patch SUSE-CAASP-ALL-2017-1881=1
- OpenStack Cloud Magnum Orchestration 7:
zypper in -t patch SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1881=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):
file-debuginfo-5.22-10.3.1
file-debugsource-5.22-10.3.1
file-devel-5.22-10.3.1
python-magic-5.22-10.3.1
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
file-debuginfo-5.22-10.3.1
file-debugsource-5.22-10.3.1
file-devel-5.22-10.3.1
python-magic-5.22-10.3.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
file-5.22-10.3.1
file-debuginfo-5.22-10.3.1
file-debugsource-5.22-10.3.1
file-magic-5.22-10.3.1
libmagic1-5.22-10.3.1
libmagic1-debuginfo-5.22-10.3.1
- SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):
file-5.22-10.3.1
file-debuginfo-5.22-10.3.1
file-debugsource-5.22-10.3.1
file-magic-5.22-10.3.1
libmagic1-5.22-10.3.1
libmagic1-debuginfo-5.22-10.3.1
- SUSE Linux Enterprise Server 12-SP3 (s390x x86_64):
libmagic1-32bit-5.22-10.3.1
libmagic1-debuginfo-32bit-5.22-10.3.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):
file-5.22-10.3.1
file-debuginfo-5.22-10.3.1
file-debugsource-5.22-10.3.1
file-magic-5.22-10.3.1
libmagic1-5.22-10.3.1
libmagic1-debuginfo-5.22-10.3.1
- SUSE Linux Enterprise Server 12-SP2 (s390x x86_64):
libmagic1-32bit-5.22-10.3.1
libmagic1-debuginfo-32bit-5.22-10.3.1
- SUSE Linux Enterprise Desktop 12-SP3 (x86_64):
file-5.22-10.3.1
file-debuginfo-5.22-10.3.1
file-debugsource-5.22-10.3.1
file-magic-5.22-10.3.1
libmagic1-32bit-5.22-10.3.1
libmagic1-5.22-10.3.1
libmagic1-debuginfo-32bit-5.22-10.3.1
libmagic1-debuginfo-5.22-10.3.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
file-5.22-10.3.1
file-debuginfo-5.22-10.3.1
file-debugsource-5.22-10.3.1
file-magic-5.22-10.3.1
libmagic1-32bit-5.22-10.3.1
libmagic1-5.22-10.3.1
libmagic1-debuginfo-32bit-5.22-10.3.1
libmagic1-debuginfo-5.22-10.3.1
- SUSE Container as a Service Platform ALL (x86_64):
file-5.22-10.3.1
file-debuginfo-5.22-10.3.1
file-debugsource-5.22-10.3.1
file-magic-5.22-10.3.1
libmagic1-5.22-10.3.1
libmagic1-debuginfo-5.22-10.3.1
- OpenStack Cloud Magnum Orchestration 7 (x86_64):
file-5.22-10.3.1
file-debuginfo-5.22-10.3.1
file-debugsource-5.22-10.3.1
file-magic-5.22-10.3.1
libmagic1-5.22-10.3.1
libmagic1-debuginfo-5.22-10.3.1
References:
https://www.suse.com/security/cve/CVE-2014-8116.html
https://www.suse.com/security/cve/CVE-2014-8117.html
https://www.suse.com/security/cve/CVE-2014-9620.html
https://www.suse.com/security/cve/CVE-2014-9621.html
https://www.suse.com/security/cve/CVE-2014-9653.html
https://bugzilla.suse.com/1009966
https://bugzilla.suse.com/1063269
https://bugzilla.suse.com/910252
https://bugzilla.suse.com/910253
https://bugzilla.suse.com/913650
https://bugzilla.suse.com/913651
https://bugzilla.suse.com/917152
https://bugzilla.suse.com/996511
More information about the sle-security-updates
mailing list