exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 3021-2

Debian Security Advisory 3021-2
Posted Sep 11, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3021-2 - This update corrects DSA 3021-1, which introduced a regression in the detection of a some "Composite Document Files" (CDF), marking them look as corrupted, with the error: "Can't expand summary_info".

tags | advisory
systems | linux, debian
advisories | CVE-2014-0207, CVE-2014-0237, CVE-2014-0238, CVE-2014-3478, CVE-2014-3479, CVE-2014-3480, CVE-2014-3487, CVE-2014-3538, CVE-2014-3587
SHA-256 | d8bc3a976a77d945fa9729274dcb77beef67b36b7e76cce28961d31ec075b64d

Debian Security Advisory 3021-2

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3021-2 security@debian.org
http://www.debian.org/security/ Luciano Bello
September 10, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : file
CVE ID : CVE-2014-0207 CVE-2014-0237 CVE-2014-0238 CVE-2014-3478
CVE-2014-3479 CVE-2014-3480 CVE-2014-3487 CVE-2014-3538
CVE-2014-3587

This update corrects DSA 3021-1, which introduced a regression in the
detection of a some "Composite Document Files" (CDF), marking them look
as corrupted, with the error: "Can't expand summary_info".

On additional information, 5.11-2+deb7u4 changed the detection of
certain text files in the same way php5 did this in 5.4.4-14+deb7u13.
Since the new output is more accurate and this change also restored
the better detection as seen in the squeeze version of file, this is
not being reverted.

For reference, the original advisory text follows:

Multiple security issues have been found in file, a tool to determine
a file type. These vulnerabilities allow remote attackers to cause a
denial of service, via resource consumption or application crash.

For the stable distribution (wheezy), these problems have been fixed in
version 5.11-2+deb7u5.

We recommend that you upgrade your file packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=KYvn
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close