drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in file
Name: |
Pufferüberlauf in file |
|
ID: |
DSA-4550-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian stretch, Debian buster |
|
Datum: |
Sa, 26. Oktober 2019, 09:23 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18218 |
|
Applikationen: |
file |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-4550-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff October 25, 2019 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : file CVE ID : CVE-2019-18218
A buffer overflow was found in file, a file type classification tool, which may result in denial of service or potentially the execution of arbitrary code if a malformed CDF (Composite Document File) file is processed.
For the oldstable distribution (stretch), this problem has been fixed in version 1:5.30-1+deb9u3.
For the stable distribution (buster), this problem has been fixed in version 1:5.35-4+deb10u1.
We recommend that you upgrade your file packages.
For the detailed security status of file please refer to its security tracker page at: https://security-tracker.debian.org/tracker/file
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl2zZAQACgkQEMKTtsN8 TjauYBAAovW1WmlJwrc7LWa9SFlQxO0az10+I9AY21LUIGB6Z5y7HyAQmLEQbMa5 OA9tGM4xxESj/31ZkCEzYe+tJEVHWROIeHNupfh27ZG8ISX3y7xi9rZkH2cIe59o Y4c3UYkzMsMDtB/+ME3yCfQhqY8rp0TU5xgoQ2khqhLBde89WlXQ09LD6PxUlIhC mp+CTiU+KDOiJN+tVP30Zgy0iOTk45j0QuqQcPmRZ2tUG5cySt8AZ7zssmlGwQ8j QsBn2Y0TvjkwlNy9hDOD7CD21uFRMjNF23UW6IZngCt56gxsv9Ija4o+UWkpTFMZ 12MWb2HXA0m7a3/pA1wxGiOcHkqcT35aNwmTa8Oe3TcA4xYUr4gGM3AZs/5fvKu7 MbF44JmsCiDW6fPapsu16OZjSozs4YZZApw5n+NH5CRCE0gT0TnaOzO7c8KVYrZW HnCe1EkcovTUmPUrlqFnJWA0wweyvlpbNOYj6XpoLxer8zlqhMQRxOZ7Slqz0tg7 wRXPGLkxKoPS0REzg9IfwHpmZZXc+hJPg/9UBO/wiF1e0VIPsU5yt55qpkS5i1Kl /KVgaIvNYqZMEpuXLzchen1Pk3oabV8bm3ZBw/bvvpA8AyRv7WdZirHumlOpLdyK wOxXer6jrH9gxGawkoa2u838oJUWnotXKqn9igUgNtn3R3E8MTI= =/K0o -----END PGP SIGNATURE-----
|
|
|
|