CVE-2014-1943

NameCVE-2014-1943
DescriptionFine Free file before 5.17 allows context-dependent attackers to cause a denial of service (infinite recursion, CPU consumption, and crash) via a crafted indirect offset value in the magic of a file.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-2861-1, DSA-2868-1
Debian Bugs738832, 739012

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
file (PTS)jessie, jessie (lts)1:5.22+15-2+deb8u7fixed
stretch (security), stretch (lts), stretch1:5.30-1+deb9u3fixed
buster1:5.35-4+deb10u2fixed
buster (security), buster (lts)1:5.35-4+deb10u1fixed
bullseye (security), bullseye1:5.39-3+deb11u1fixed
bookworm1:5.44-3fixed
sid, trixie1:5.45-3fixed
php5 (PTS)jessie, jessie (lts)5.6.40+dfsg-0+deb8u21fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
filesourcesqueeze5.04-5+squeeze3DSA-2861-1
filesourcewheezy5.11-2+deb7u1DSA-2861-1
filesource(unstable)1:5.17-0.1738832
php5sourcesqueeze5.3.3-7+squeeze19DSA-2868-1
php5sourcewheezy5.4.4-14+deb7u8DSA-2868-1
php5source(unstable)5.5.10+dfsg-1739012

Notes

http://mx.gw.com/pipermail/file/2014/001337.html
https://github.com/glensc/file/commit/3c081560c23f20b2985c285338b52c7aae9fdb0f
https://github.com/glensc/file/commit/cc9e74dfeca5265ad725acc926ef0b8d2a18ee70

Search for package or bug name: Reporting problems