Lucene search

K
centosCentOS ProjectCESA-2014:1606
HistoryOct 20, 2014 - 6:08 p.m.

file, python security update

2014-10-2018:08:44
CentOS Project
lists.centos.org
63

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.959 High

EPSS

Percentile

99.4%

CentOS Errata and Security Advisory CESA-2014:1606

The โ€œfileโ€ command is used to identify a particular file according to the
type of data contained in the file. The command can identify various file
types, including ELF binaries, system libraries, RPM packages, and
different graphics formats.

Multiple denial of service flaws were found in the way file parsed certain
Composite Document Format (CDF) files. A remote attacker could use either
of these flaws to crash file, or an application using file, via a specially
crafted CDF file. (CVE-2014-0237, CVE-2014-0238, CVE-2014-3479,
CVE-2014-3480, CVE-2012-1571)

Two denial of service flaws were found in the way file handled indirect and
search rules. A remote attacker could use either of these flaws to cause
file, or an application using file, to crash or consume an excessive amount
of CPU. (CVE-2014-1943, CVE-2014-2270)

This update also fixes the following bugs:

  • Previously, the output of the โ€œfileโ€ command contained redundant white
    spaces. With this update, the new STRING_TRIM flag has been introduced to
    remove the unnecessary white spaces. (BZ#664513)

  • Due to a bug, the โ€œfileโ€ command could incorrectly identify an XML
    document as a LaTex document. The underlying source code has been modified
    to fix this bug and the command now works as expected. (BZ#849621)

  • Previously, the โ€œfileโ€ command could not recognize .JPG files and
    incorrectly labeled them as โ€œMinix filesystemโ€. This bug has been fixed and
    the command now properly detects .JPG files. (BZ#873997)

  • Under certain circumstances, the โ€œfileโ€ command incorrectly detected
    NETpbm files as โ€œx86 boot sectorโ€. This update applies a patch to fix this
    bug and the command now detects NETpbm files as expected. (BZ#884396)

  • Previously, the โ€œfileโ€ command incorrectly identified ASCII text files as
    a .PIC image file. With this update, a patch has been provided to address
    this bug and the command now correctly recognizes ASCII text files.
    (BZ#980941)

  • On 32-bit PowerPC systems, the โ€œfromโ€ field was missing from the output
    of the โ€œfileโ€ command. The underlying source code has been modified to fix
    this bug and โ€œfileโ€ output now contains the โ€œfromโ€ field as expected.
    (BZ#1037279)

  • The โ€œfileโ€ command incorrectly detected text files as โ€œRRDTool DB version
    ool - Round Robin Database Toolโ€. This update applies a patch to fix this
    bug and the command now correctly detects text files. (BZ#1064463)

  • Previously, the โ€œfileโ€ command supported only version 1 and 2 of the QCOW
    format. As a consequence, file was unable to detect a โ€œqcow2 compat=1.1โ€
    file created on Red Hat Enterprise Linux 7. With this update, support for
    QCOW version 3 has been added so that the command now detects such files as
    expected. (BZ#1067771)

All file users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-cr-announce/2014-October/027446.html

Affected packages:
file
file-devel
file-libs
file-static
python-magic

Upstream details at:
https://access.redhat.com/errata/RHSA-2014:1606

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.959 High

EPSS

Percentile

99.4%