CVE-2015-8865 (retired)

Priority
Description
The file_check_mem function in funcs.c in file before 5.23, as used in the
Fileinfo component in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x
before 7.0.5, mishandles continuation-level jumps, which allows
context-dependent attackers to cause a denial of service (buffer overflow
and application crash) or possibly execute arbitrary code via a crafted
magic file.
Assigned-to
mdeslaur
Notes
Package
Source: file (LP Ubuntu Debian)
Upstream:released (1:5.24-1)
Ubuntu 12.04 ESM (Precise Pangolin):released (5.09-2ubuntu0.7)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (1:5.25-2ubuntu1)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected
Patches:
Upstream:https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36
Package
Source: php5 (LP Ubuntu Debian)
Upstream:released (5.6.20+dfsg-1)
Ubuntu 12.04 ESM (Precise Pangolin):released (5.3.10-1ubuntu3.22)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Patches:
Upstream:http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e
Package
Upstream:released (7.0.5-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (7.0.4-7ubuntu2.1)
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Patches:
Upstream:https://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e
Upstream:https://git.php.net/?p=php-src.git;a=commit;h=5272184a1ed0c5c6144e80bed6fb1951601ec3bc
More Information

Updated: 2019-10-09 07:54:30 UTC (commit 33aea848a182c0afcd0a3f927a01a7ecd9a061ee)