Type: | SECURITY |
Severity: | MODERATE |
Release Date: | 2015-11-23 |
[5.11-31]
- fix #1255396 - Make the build ID output consistent with other tools
[5.11-30]
- fix CVE-2014-8116 - bump the acceptable ELF program headers count to 2048
[5.11-29]
- fix #839229 - fix detection of version of XML files
[5.11-28]
- fix #839229 - fix detection of version of XML files
[5.11-27]
- fix CVE-2014-0207 - cdf_read_short_sector insufficient boundary check
- fix CVE-2014-0237 - cdf_unpack_summary_info() excessive looping DoS
- fix CVE-2014-0238 - CDF property info parsing nelements infinite loop
- fix CVE-2014-3478 - mconvert incorrect handling of truncated pascal string
- fix CVE-2014-3479 - fix extensive backtracking in regular expression
- fix CVE-2014-3480 - cdf_count_chain insufficient boundary check
- fix CVE-2014-3487 - cdf_read_property_info insufficient boundary check
- fix CVE-2014-3538 - unrestricted regular expression matching
- fix CVE-2014-3587 - fix cdf_read_property_info
- fix CVE-2014-3710 - out-of-bounds read in elf note headers
- fix CVE-2014-8116 - multiple denial of service issues (resource consumption)
- fix CVE-2014-8117 - denial of service issue (resource consumption)
- fix CVE-2014-9652 - out of bounds read in mconvert()
- fix CVE-2014-9653 - malformed elf file causes access to uninitialized memory
[5.11-26]
- fix #1080452 - remove .orig files from magic directory
[5.11-25]
- fix #1224667, #1224668 - show additional info for Linux swap files
[5.11-24]
- fix #1064268 - fix stray return -1
[5.11-23]
- fix #1094648 - improve Minix detection pattern to fix false positives
- fix #1161912 - trim white-spaces during ISO9660 detection
- fix #1157850 - fix detection of ppc64le ELF binaries
- fix #1161911 - display 'from' field on 32bit ppc core
- fix #1064167 - revert MAXMIME patch
- fix #1064268 - detect Dwarf debuginfo as 'not stripped'
- fix #1082689 - fix invalid read when matched pattern is the last one tried
- fix #1080362 - remove deadcode and OFFSET_OOB redefinition
[5.11-22]
- fix #1067688 - add support for aarch64 ELF binaries
CVE-2014-0207 |
CVE-2014-0237 |
CVE-2014-0238 |
CVE-2014-3479 |
CVE-2014-3480 |
CVE-2014-3487 |
CVE-2014-3478 |
CVE-2014-3538 |
CVE-2014-3587 |
CVE-2014-3710 |
CVE-2014-9652 |
CVE-2014-8116 |
CVE-2014-8117 |
CVE-2014-9653 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 7 (x86_64) | file-5.11-31.el7.src.rpm | cfce285959c7a50d5b74b150b0d5cf3d | ELBA-2020-3917 |
file-5.11-31.el7.x86_64.rpm | 6a46aea0272105be7f9644a98100c142 | ELBA-2020-3917 | |
file-devel-5.11-31.el7.i686.rpm | a840ddb2564792eed04806e737d18168 | ELBA-2020-3917 | |
file-devel-5.11-31.el7.x86_64.rpm | 9700b47b14855539a691e866b40e9526 | ELBA-2020-3917 | |
file-libs-5.11-31.el7.i686.rpm | b873d2bef0fbb2825a585a9dff1fb624 | ELBA-2020-3917 | |
file-libs-5.11-31.el7.x86_64.rpm | b0fd34a9e7f7b0be93dcd3efbc8ac614 | ELBA-2020-3917 | |
file-static-5.11-31.el7.i686.rpm | df362e5be0a1d190ffa7243d9806254b | ELBA-2020-3917 | |
file-static-5.11-31.el7.x86_64.rpm | fe6709b6e31ef7b5a75fa7ff53ce6e7f | ELBA-2020-3917 | |
python-magic-5.11-31.el7.noarch.rpm | a28b469542ffdff5e98d2ca6c33c77aa | ELBA-2020-3917 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team