CVE-2017-1000249

NameCVE-2017-1000249
DescriptionAn issue in file() was introduced in commit 9611f31313a93aa036389c5f3b15eea53510d4d1 (Oct 2016) lets an attacker overwrite a fixed 20 bytes stack buffer with a specially crafted .notes section in an ELF binary. This was fixed in commit 35c94dc6acc418f1ad7f6241a6680e5327495793 (Aug 2017).
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-3965-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
file (PTS)jessie, jessie (lts)1:5.22+15-2+deb8u7fixed
stretch (security), stretch (lts), stretch1:5.30-1+deb9u3fixed
buster1:5.35-4+deb10u2fixed
buster (security), buster (lts)1:5.35-4+deb10u1fixed
bullseye (security), bullseye1:5.39-3+deb11u1fixed
bookworm1:5.44-3fixed
sid, trixie1:5.45-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
filesourcewheezy(not affected)
filesourcejessie(not affected)
filesourcestretch1:5.30-1+deb9u1DSA-3965-1
filesource(unstable)1:5.32-1

Notes

[jessie] - file <not-affected> (Vulnerable code introduced later)
[wheezy] - file <not-affected> (Vulnerable code introduced later)
Upstream fix: https://github.com/file/file/commit/35c94dc6acc418f1ad7f6241a6680e5327495793
Introduced by: https://github.com/file/file/commit/9611f31313a93aa036389c5f3b15eea53510d4d1

Search for package or bug name: Reporting problems