First published: Mon Feb 18 2019(Updated: )
do_bid_note in readelf.c in libmagic.a in file 5.35 has a stack-based buffer over-read, related to file_printf and file_vprintf.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/file | 1:5.35-4+deb10u2 1:5.35-4+deb10u1 1:5.39-3+deb11u1 1:5.44-3 1:5.45-2 | |
File Project File | =5.35 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
=5.35 | ||
=16.04 | ||
=18.04 | ||
=18.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8904 is a vulnerability in libmagic.a in file 5.35 that allows for a stack-based buffer over-read.
CVE-2019-8904 has a severity rating of 8.8 (High).
The affected software includes file 5.35 on Ubuntu Linux 16.04, Ubuntu Linux 18.04, Ubuntu Linux 18.10, and Debian.
Yes, the remedy for CVE-2019-8904 is to update file to version 1:5.35-3 on Ubuntu and to versions 1:5.35-4+deb10u2, 1:5.35-4+deb10u1, 1:5.39-3+deb11u1, 1:5.44-3, or 1:5.45-2 on Debian.
More information about CVE-2019-8904 can be found at the following references: http://www.securityfocus.com/bid/107130, https://bugs.astron.com/view.php?id=62, https://usn.ubuntu.com/3911-1/