Package: file Version: 4.12-1, 4.17-5 Severity: grave Justification: user security hole Tags: security, patch, etch, sarge
>From http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1536: Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow. Patch from RedHat/Ubuntu: http://bugzilla.redhat.com/bugzilla/attachment.cgi?id=150541 Sorry, I wasn't able to test it, since I haven't found any PoC exploit yet, but since the bug was announced this year (Changelog for 4.20) and the last uploads for Sarge and Etch were last year or earlier, I assume that the bug is in Sarge as well as in Etch. Sid already has upstream version 4.20 which is fixed. -- System Information: Debian Release: 3.1 Architecture: i386 (i686) Kernel: Linux 2.4.33.2-1-dphys-k8-smp-64gb Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Versions of packages file depends on: ii libc6 2.3.2.ds1-22sarge5 GNU C Library: Shared libraries an ii libmagic1 4.12-1 File type determination library us ii zlib1g 1:1.2.2-4.sarge.2 compression library - runtime -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]