<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">file-5.29-2.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10221-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">file-5.29-2.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the file-5.29-2.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10221</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1571/</URL>
      <Description>SUSE CVE CVE-2012-1571 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3710/</URL>
      <Description>SUSE CVE CVE-2014-3710 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-8116/</URL>
      <Description>SUSE CVE CVE-2014-8116 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-8117/</URL>
      <Description>SUSE CVE CVE-2014-8117 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="file-5.29-2.1">
      <FullProductName ProductID="file-5.29-2.1">file-5.29-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="file-devel-5.29-2.1">
      <FullProductName ProductID="file-devel-5.29-2.1">file-devel-5.29-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="file-devel-32bit-5.29-2.1">
      <FullProductName ProductID="file-devel-32bit-5.29-2.1">file-devel-32bit-5.29-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="file-magic-5.29-2.1">
      <FullProductName ProductID="file-magic-5.29-2.1">file-magic-5.29-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmagic1-5.29-2.1">
      <FullProductName ProductID="libmagic1-5.29-2.1">libmagic1-5.29-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmagic1-32bit-5.29-2.1">
      <FullProductName ProductID="libmagic1-32bit-5.29-2.1">libmagic1-32bit-5.29-2.1</FullProductName>
    </Branch>
    <Relationship ProductReference="file-5.29-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:file-5.29-2.1">file-5.29-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="file-devel-5.29-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:file-devel-5.29-2.1">file-devel-5.29-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="file-devel-32bit-5.29-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:file-devel-32bit-5.29-2.1">file-devel-32bit-5.29-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="file-magic-5.29-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:file-magic-5.29-2.1">file-magic-5.29-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmagic1-5.29-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmagic1-5.29-2.1">libmagic1-5.29-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmagic1-32bit-5.29-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmagic1-32bit-5.29-2.1">libmagic1-32bit-5.29-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">file before 5.11 and libmagic allow remote attackers to cause a denial of service (crash) via a crafted Composite Document File (CDF) file that triggers (1) an out-of-bounds read or (2) an invalid pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2012-1571</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:file-5.29-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:file-devel-32bit-5.29-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:file-devel-5.29-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:file-magic-5.29-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmagic1-32bit-5.29-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmagic1-5.29-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1571.html</URL>
        <Description>CVE-2012-1571</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/753303</URL>
        <Description>SUSE Bug 753303</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/883306</URL>
        <Description>SUSE Bug 883306</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/884986</URL>
        <Description>SUSE Bug 884986</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/987530</URL>
        <Description>SUSE Bug 987530</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The donote function in readelf.c in file through 5.20, as used in the Fileinfo component in PHP 5.4.34, does not ensure that sufficient note headers are present, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.</Note>
    </Notes>
    <CVE>CVE-2014-3710</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:file-5.29-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:file-devel-32bit-5.29-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:file-devel-5.29-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:file-magic-5.29-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmagic1-32bit-5.29-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmagic1-5.29-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3710.html</URL>
        <Description>CVE-2014-3710</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/902367</URL>
        <Description>SUSE Bug 902367</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/910252</URL>
        <Description>SUSE Bug 910252</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ELF parser (readelf.c) in file before 5.21 allows remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities.</Note>
    </Notes>
    <CVE>CVE-2014-8116</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:file-5.29-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:file-devel-32bit-5.29-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:file-devel-5.29-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:file-magic-5.29-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmagic1-32bit-5.29-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmagic1-5.29-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8116.html</URL>
        <Description>CVE-2014-8116</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/910252</URL>
        <Description>SUSE Bug 910252</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/910253</URL>
        <Description>SUSE Bug 910253</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917152</URL>
        <Description>SUSE Bug 917152</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">softmagic.c in file before 5.21 does not properly limit recursion, which allows remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2014-8117</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:file-5.29-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:file-devel-32bit-5.29-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:file-devel-5.29-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:file-magic-5.29-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmagic1-32bit-5.29-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmagic1-5.29-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8117.html</URL>
        <Description>CVE-2014-8117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/910252</URL>
        <Description>SUSE Bug 910252</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/910253</URL>
        <Description>SUSE Bug 910253</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917152</URL>
        <Description>SUSE Bug 917152</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
