Headline
Debian Security Advisory 5592-1
Debian Linux Security Advisory 5592-1 - It was discovered that missing input sanitising in libspreadsheet-parseexcel-perl, a Perl module to access information from Excel Spreadsheets, may result in the execution of arbitrary commands if a specially crafted document file is processed.
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512- -------------------------------------------------------------------------Debian Security Advisory DSA-5592-1 [email protected]://www.debian.org/security/ Salvatore BonaccorsoDecember 30, 2023 https://www.debian.org/security/faq- -------------------------------------------------------------------------Package : libspreadsheet-parseexcel-perlCVE ID : CVE-2023-7101Debian Bug : 1059450It was discovered that missing input sanitising inlibspreadsheet-parseexcel-perl, a Perl module to access information fromExcel Spreadsheets, may result in the execution of arbitrary commands ifa specially crafted document file is processed.For the oldstable distribution (bullseye), this problem has been fixedin version 0.6500-1.1+deb11u1.For the stable distribution (bookworm), this problem has been fixed inversion 0.6500-4~deb12u1.We recommend that you upgrade your libspreadsheet-parseexcel-perl packages.For the detailed security status of libspreadsheet-parseexcel-perlplease refer to its security tracker page at:https://security-tracker.debian.org/tracker/libspreadsheet-parseexcel-perlFurther information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: https://www.debian.org/security/Mailing list: [email protected] PGP SIGNATURE-----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Yl6V-----END PGP SIGNATURE-----
Related news
Hello everyone! It has been 3 months since the last episode. I spent most of this time improving my Vulristics project. So in this episode, let’s take a look at what’s been done. Alternative video link (for Russia): https://vk.com/video-149273431_456239139 Also, let’s take a look at the Microsoft Patch Tuesdays vulnerabilities, Linux Patch Wednesdays vulnerabilities and […]
By Waqas CISA Urges Swift Action as Two Critical Vulnerabilities Emerge. This is a post from HackRead.com Read the original post: CISA Warns of Exploited Vulnerabilities in Chrome and Excel Parsing Library
Barracuda has revealed that Chinese threat actors exploited a new zero-day in its Email Security Gateway (ESG) appliances to deploy backdoor on a "limited number" of devices. Tracked as CVE-2023-7102, the issue relates to a case of arbitrary code execution that resides within a third-party and open-source library Spreadsheet::ParseExcel that's used by the Amavis scanner within the