Debian Linux Security Advisory 5786-1 - Integer overflows flaws were discovered in the Compound Document Binary File format parser of libgsf, the GNOME Project G Structured File Library, which could result in the execution of arbitrary code if a specially crafted file is processed.
98c0d59e2d6c56f5374ef98a8c7336b85fff3f90be2ec312d6bc3af96e794ba8
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5786-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
October 05, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libgsf
CVE ID : CVE-2024-36474 CVE-2024-42415
Debian Bug : 1084056
Integer overflows flaws were discovered in the Compound Document Binary
File format parser of libgsf, the GNOME Project G Structured File
Library, which could result in the execution of arbitrary code if a
specially crafted file is processed.
For the stable distribution (bookworm), these problems have been fixed in
version 1.14.50-1+deb12u1.
We recommend that you upgrade your libgsf packages.
For the detailed security status of libgsf please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/libgsf
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=pubk
-----END PGP SIGNATURE-----