CVE-2015-8865

NameCVE-2015-8865
DescriptionThe file_check_mem function in funcs.c in file before 5.23, as used in the Fileinfo component in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5, mishandles continuation-level jumps, which allows context-dependent attackers to cause a denial of service (buffer overflow and application crash) or possibly execute arbitrary code via a crafted magic file.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-460-1, DLA-499-1, DSA-3560-1
Debian Bugs827377, 835032

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
file (PTS)buster1:5.35-4+deb10u2fixed
buster (security)1:5.35-4+deb10u1fixed
bullseye (security), bullseye1:5.39-3+deb11u1fixed
bookworm1:5.44-3fixed
trixie1:5.45-2fixed
sid1:5.45-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
filesourcewheezy5.11-2+deb7u9DLA-460-1
filesourcejessie1:5.22+15-2+deb8u2
filesource(unstable)1:5.24-1827377
hhvmsource(unstable)3.12.11+dfsg-1835032
php5sourcewheezy5.4.45-0+deb7u3DLA-499-1
php5sourcejessie5.6.20+dfsg-0+deb8u1DSA-3560-1
php5source(unstable)5.6.20+dfsg-1
php7.0source(unstable)7.0.5-1

Notes

http://bugs.gw.com/view.php?id=522
https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36
https://bugs.php.net/bug.php?id=71527
https://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e
PHP fixed in 7.0.5, 5.6.20, 5.5.34
https://www.openwall.com/lists/oss-security/2016/04/11/7
Fix in HHVM: https://github.com/facebook/hhvm/commit/4e614ba041e24af8351afbb49c92444c0850f23b

Search for package or bug name: Reporting problems