USN-3686-2: file vulnerabilities
28 June 2018
Several security issues were fixed in file.
Releases
Packages
- file - Tool to determine file types
Details
USN-3686-1 fixed a vulnerability in file. This update provides
the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
It was discovered that file incorrectly handled certain magic files. An
attacker could use this issue with a specially crafted magic file to cause
a denial of service, or possibly execute arbitrary code. (CVE-2015-8865)
It was discovered that file incorrectly handled certain malformed ELF
files. An attacker could use this issue to cause a denial of service.
(CVE-2018-10360)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-3686-1: python3-magic, libmagic1, libmagic-dev, python-magic, libmagic-mgc, file
- USN-2984-1: php7.0-mcrypt, php5-ldap, php5-recode, php5-common, php5-snmp, php5-sybase, libapache2-mod-php5filter, php5-enchant, php7.0-opcache, php5-xsl, php5-gd, php5, php7.0-cgi, php7.0-xsl, php7.0-cli, php7.0-pspell, php5-xmlrpc, php5-pspell, php7.0-imap, php7.0-pgsql, php7.0-fpm, php5-pgsql, php7.0-recode, php7.0-bz2, libapache2-mod-php7.0, php7.0-bcmath, php7.0-curl, php7.0-gd, php7.0-interbase, php7.0-snmp, php7.0-xmlrpc, libphp7.0-embed, php7.0-zip, php5-tidy, php5-intl, php5-cli, php7.0-odbc, php7.0-sybase, php7.0-readline, php5-mysql, php5-curl, php5-sqlite, libapache2-mod-php5, php7.0-gmp, php7.0, libphp5-embed, php5-dev, php5-mysqlnd, php7.0-json, php7.0-ldap, php5-cgi, php7.0-sqlite3, php5-fpm, php7.0-dev, php7.0-intl, php7.0-soap, php7.0-tidy, php7.0-common, php5-readline, php5-odbc, php7.0-phpdbg, php5-gmp, php7.0-mysql, php7.0-mbstring, php7.0-enchant, php7.0-xml, php-pear