Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Leap:42.2:Update
patchinfo.7512
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.7512
<patchinfo incident="7512"> <issue id="1009966" tracker="bnc">file command throws "Composite Document File V2 Document, corrupt: Can't read SSAT" error against excel 97/2003 file format.</issue> <issue id="1063269" tracker="bnc">*** Error in `rpmbuild': free(): invalid pointer: 0x00000000026a7df0 ***</issue> <issue id="917152" tracker="bnc">VUL-1: CVE-2014-9653 file: malformed elf file causes access to uninitialized memory</issue> <issue id="910253" tracker="bnc">VUL-0: CVE-2014-8117: denial of service issue (resource consumption)</issue> <issue id="910252" tracker="bnc">VUL-1: CVE-2014-8116: file: multiple denial of service issues (resource consumption)</issue> <issue id="913650" tracker="bnc">VUL-1: CVE-2014-9621 file: limit string printing to 100 chars</issue> <issue id="913651" tracker="bnc">VUL-1: CVE-2014-9620 file: limit the number of ELF notes processed</issue> <issue id="996511" tracker="bnc">File path to long for qemu image format magic haeder (Was: file -s clips qcow2 backing file name)</issue> <issue id="2014-8117" tracker="cve" /> <issue id="2014-8116" tracker="cve" /> <issue id="2014-9620" tracker="cve" /> <issue id="2014-9621" tracker="cve" /> <issue id="2014-9653" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>WernerFink</packager> <description>The GNU file utility was updated to version 5.22. Security issues fixed: - CVE-2014-9621: The ELF parser in file allowed remote attackers to cause a denial of service via a long string. (bsc#913650) - CVE-2014-9620: The ELF parser in file allowed remote attackers to cause a denial of service via a large number of notes. (bsc#913651) - CVE-2014-9653: readelf.c in file did not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file. (bsc#917152) - CVE-2014-8116: The ELF parser (readelf.c) in file allowed remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities. (bsc#910253) - CVE-2014-8117: softmagic.c in file did not properly limit recursion, which allowed remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors. (bsc#910253) Version update to file version 5.22 * add indirect relative for TIFF/Exif * restructure elf note printing to avoid repeated messages * add note limit, suggested by Alexander Cherepanov * Bail out on partial pread()'s (Alexander Cherepanov) * Fix incorrect bounds check in file_printable (Alexander Cherepanov) * PR/405: ignore SIGPIPE from uncompress programs * change printable -> file_printable and use it in more places for safety * in ELF, instead of "(uses dynamic libraries)" when PT_INTERP is present print the interpreter name. Version update to file version 5.21 * there was an incorrect free in magic_load_buffers() * there was an out of bounds read for some pascal strings * there was a memory leak in magic lists * don't interpret strings printed from files using the current locale, convert them to ascii format first. * there was an out of bounds read in elf note reads Update to file version 5.20 * recognize encrypted CDF documents * add magic_load_buffers from Brooks Davis * add thumbs.db support Additional non-security bug fixes: * Fixed a memory corruption during rpmbuild (bsc#1063269) * Backport of a fix for an increased printable string length as found in file 5.30 (bsc#996511) * file command throws "Composite Document File V2 Document, corrupt: Can't read SSAT" error against excel 97/2003 file format. (bsc#1009966) This update was imported from the SUSE:SLE-12:Update update project.</description> <summary>Security update for file</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor