Lucene search

K
mageiaGentoo FoundationMGASA-2014-0282
HistoryJul 04, 2014 - 10:26 p.m.

Updated file packages fix security vulnerabilities

2014-07-0422:26:27
Gentoo Foundation
advisories.mageia.org
19

0.157 Low

EPSS

Percentile

95.9%

A flaw was found in the way file parsed property information from Composite Document Files (CDF) files, where the mconvert() function did not correctly compute the truncated pascal string size (CVE-2014-3478). Multiple flaws were found in the way file parsed property information from Composite Document Files (CDF) files, due to insufficient boundary checks on buffers (CVE-2014-3479, CVE-2014-3480, CVE-2014-3487). Note: these issues were announced as part of the upstream PHP 5.4.30 release, as PHP bundles file’s libmagic library. Their announcement also references an issue in CDF file parsing, CVE-2014-0207, which was previously fixed in the file package in MGASA-2014-0252, but was not announced at that time.

OSVersionArchitecturePackageVersionFilename
Mageia3noarchfile< 5.12-8.5file-5.12-8.5.mga3
Mageia4noarchfile< 5.16-1.4file-5.16-1.4.mga4