Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- Debian Security Advisory 5489-1[6]
- Authored by Debian[7] | Site debian.org[8]
-
Debian Linux Security Advisory 5489-1 - A buffer overflow was found in file, a file type classification tool, which may result in denial of service if a specially crafted file is processed.
- systems | linux[9], debian[10]
- advisories | CVE-2022-48554[11]
- SHA-256 |
11804ccfaa14ea7a3220a9d96e13192b89e7663a01dc3972c495d965989c300c
- Download[12] | Favorite[13] | View[14]
Change Mirror[15] Download[16]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5489-1Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser.
https://www.debian.org/security/ Salvatore Bonaccorso
September 04, 2023 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : file
CVE ID : CVE-2022-48554
A buffer overflow was found in file, a file type classification tool,
which may result in denial of service if a specially crafted file is
processed.
For the oldstable distribution (bullseye), this problem has been fixed
in version 1:5.39-3+deb11u1.
We recommend that you upgrade your file packages.
For the detailed security status of file please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/file
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list:Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser.
-----BEGIN PGP SIGNATURE-----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=kuBK
-----END PGP SIGNATURE-----
File Tags
- ActiveX[22] (932)
- Advisory[23] (82,115)
- Arbitrary[24] (16,225)
- BBS[25] (2,859)
- Bypass[26] (1,742)
- CGI[27] (1,027)
- Code Execution[28] (7,289)
- Conference[29] (680)
- Cracker[30] (841)
- CSRF[31] (3,348)
- DoS[32] (23,482)
- Encryption[33] (2,370)
- Exploit[34] (52,042)
- File Inclusion[35] (4,227)
- File Upload[36] (976)
- Firewall[37] (821)
- Info Disclosure[38] (2,791)
- Intrusion Detection[39] (892)
- Java[40] (3,049)
- JavaScript[41] (859)
- Kernel[42] (6,706)
- Local[43] (14,479)
- Magazine[44] (586)
- Overflow[45] (12,699)
- Perl[46] (1,423)
- PHP[47] (5,151)
- Proof of Concept[48] (2,343)
- Protocol[49] (3,603)
- Python[50] (1,535)
- Remote[51] (30,838)
- Root[52] (3,588)
- Rootkit[53] (508)
- Ruby[54] (612)
- Scanner[55] (1,641)
- Security Tool[56] (7,893)
- Shell[57] (3,192)
- Shellcode[58] (1,215)
- Sniffer[59] (895)
- Spoof[60] (2,208)
- SQL Injection[61] (16,400)
- TCP[62] (2,406)
- Trojan[63] (687)
- UDP[64] (893)
- Virus[65] (666)
- Vulnerability[66] (31,808)
- Web[67] (9,688)
- Whitepaper[68] (3,751)
- x86[69] (962)
- XSS[70] (17,981)
- Other[71]
File Archives
- September 2023[72]
- August 2023[73]
- July 2023[74]
- June 2023[75]
- May 2023[76]
- April 2023[77]
- March 2023[78]
- February 2023[79]
- January 2023[80]
- December 2022[81]
- November 2022[82]
- October 2022[83]
- Older[84]
Systems
- AIX[85] (428)
- Apple[86] (2,002)
- BSD[87] (373)
- CentOS[88] (57)
- Cisco[89] (1,925)
- Debian[90] (6,827)
- Fedora[91] (1,692)
- FreeBSD[92] (1,244)
- Gentoo[93] (4,322)
- HPUX[94] (879)
- iOS[95] (351)
- iPhone[96] (108)
- IRIX[97] (220)
- Juniper[98] (68)
- Linux[99] (46,615)
- Mac OS X[100] (686)
- Mandriva[101] (3,105)
- NetBSD[102] (256)
- OpenBSD[103] (485)
- RedHat[104] (13,816)
- Slackware[105] (941)
- Solaris[106] (1,610)
- SUSE[107] (1,444)
- Ubuntu[108] (8,869)
- UNIX[109] (9,304)
- UnixWare[110] (186)
- Windows[111] (6,581)
- Other[112]
- Services
- Security Services[123]
- Hosting By
- Rokasec[124]

Read more https://packetstormsecurity.com/files/174509/dsa-5489-1.txt