Lucene search

K
gentooGentoo FoundationGLSA-202409-06
HistorySep 22, 2024 - 12:00 a.m.

file: Stack Buffer Overread

2024-09-2200:00:00
Gentoo Foundation
security.gentoo.org
1
file utility
binary data
vulnerabilities
stack buffer over-read
file_copystr
upgrade.

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

AI Score

7.8

Confidence

Low

EPSS

0.002

Percentile

52.4%

Background

The file utility attempts to identify a file’s format by scanning binary data for patterns.

Description

Multiple vulnerabilities have been discovered in file. Please review the CVE identifiers referenced below for details.

Impact

File has an stack-based buffer over-read in file_copystr in funcs.c.

Workaround

There is no known workaround at this time.

Resolution

All file users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-apps/file-5.42"
OSVersionArchitecturePackageVersionFilename
Gentooanyallsys-apps/file< 5.42UNKNOWN

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

AI Score

7.8

Confidence

Low

EPSS

0.002

Percentile

52.4%