==========================================================================
Ubuntu Security Notice USN-2123-1
February 26, 2014
file vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 13.10
– Ubuntu 12.10
– Ubuntu 12.04 LTS
– Ubuntu 10.04 LTS
Summary:
File could be made to crash if it processed a specially crafted file.
Software Description:
– file: Tool to determine file types
Details:
It was discovered that file incorrectly handled Composite Document files.
An attacker could use this issue to cause file to crash, resulting in a
denial of service. This issue only affected Ubuntu 10.04 LTS and Ubuntu
12.04 LTS. (CVE-2012-1571)
Bernd Melchers discovered that file incorrectly handled indirect offset
values. An attacker could use this issue to cause file to consume resources
or crash, resulting in a denial of service. (CVE-2014-1943)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 13.10:
file 5.11-2ubuntu4.1
libmagic1 5.11-2ubuntu4.1
Ubuntu 12.10:
file 5.11-2ubuntu0.1
libmagic1 5.11-2ubuntu0.1
Ubuntu 12.04 LTS:
file 5.09-2ubuntu0.2
libmagic1 5.09-2ubuntu0.2
Ubuntu 10.04 LTS:
file 5.03-5ubuntu1.1
libmagic1 5.03-5ubuntu1.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2123-1
CVE-2012-1571, CVE-2014-1943
Package Information:
https://launchpad.net/ubuntu/+source/file/5.11-2ubuntu4.1
https://launchpad.net/ubuntu/+source/file/5.11-2ubuntu0.1
https://launchpad.net/ubuntu/+source/file/5.09-2ubuntu0.2
https://launchpad.net/ubuntu/+source/file/5.03-5ubuntu1.1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/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=Cd3X
—–END PGP SIGNATURE—–
—