Search This Blog

Wednesday, September 10, 2014

[SECURITY] [DSA 3021-2] file regression update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3021-2 security@debian.org
http://www.debian.org/security/ Luciano Bello
September 10, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : file
CVE ID : CVE-2014-0207 CVE-2014-0237 CVE-2014-0238 CVE-2014-3478
CVE-2014-3479 CVE-2014-3480 CVE-2014-3487 CVE-2014-3538
CVE-2014-3587

This update corrects DSA 3021-1, which introduced a regression in the
detection of a some "Composite Document Files" (CDF), marking them look
as corrupted, with the error: "Can't expand summary_info".

On additional information, 5.11-2+deb7u4 changed the detection of
certain text files in the same way php5 did this in 5.4.4-14+deb7u13.
Since the new output is more accurate and this change also restored
the better detection as seen in the squeeze version of file, this is
not being reverted.

For reference, the original advisory text follows:

Multiple security issues have been found in file, a tool to determine
a file type. These vulnerabilities allow remote attackers to cause a
denial of service, via resource consumption or application crash.

For the stable distribution (wheezy), these problems have been fixed in
version 5.11-2+deb7u5.

We recommend that you upgrade your file packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=KYvn
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: https://lists.debian.org/2735906.RgkWYiHb9h@mybox

No comments: