file is vulnerable to arbitrary code execution. The cdf_read_property_info
function in cdf.c
does not restrict the number of CDF_VECTOR elements, resulting a heap-based buffer overflow (4-byte out-of-bounds write).
lists.opensuse.org/opensuse-security-announce/2020-05/msg00044.html
bugs.chromium.org/p/oss-fuzz/issues/detail?id=16780
github.com/file/file/commit/46a8443f76cec4b41ec736eca396984c74664f84
lists.debian.org/debian-lts-announce/2019/10/msg00032.html
lists.debian.org/debian-lts-announce/2021/07/msg00008.html
lists.fedoraproject.org/archives/list/[email protected]/message/CV6PFCEYHYALMTT45QE2U5C5TEJZQPXJ/
lists.fedoraproject.org/archives/list/[email protected]/message/D6BJVGXSCC6NMIAWX36FPWHEIFON3OSE/
lists.fedoraproject.org/archives/list/[email protected]/message/VBK6XOJR6OVWT2FUEBO7V7KCOSSLAP52/
security.gentoo.org/glsa/202003-24
security.netapp.com/advisory/ntap-20200115-0001/
usn.ubuntu.com/4172-1/
usn.ubuntu.com/4172-2/
www.debian.org/security/2019/dsa-4550