Name | CVE-2014-3538 |
Description | file before 5.19 does not properly restrict the amount of data read during a regex search, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted file that triggers backtracking during processing of an awk rule. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7345. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-50-1, DLA-67-1, DSA-3008-1, DSA-3021-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
file (PTS) | jessie, jessie (lts) | 1:5.22+15-2+deb8u7 | fixed |
stretch (security), stretch (lts), stretch | 1:5.30-1+deb9u3 | fixed | |
buster | 1:5.35-4+deb10u2 | fixed | |
buster (security), buster (lts) | 1:5.35-4+deb10u1 | fixed | |
bullseye (security), bullseye | 1:5.39-3+deb11u1 | fixed | |
bookworm | 1:5.44-3 | fixed | |
sid, trixie | 1:5.45-3 | fixed | |
php5 (PTS) | jessie, jessie (lts) | 5.6.40+dfsg-0+deb8u21 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
file | source | squeeze | 5.04-5+squeeze7 | DLA-50-1 | ||
file | source | wheezy | 5.11-2+deb7u4 | DSA-3021-1 | ||
file | source | (unstable) | 1:5.19-1 | |||
php5 | source | squeeze | 5.3.3-7+squeeze22 | DLA-67-1 | ||
php5 | source | wheezy | 5.4.4-14+deb7u13 | DSA-3008-1 | ||
php5 | source | (unstable) | 5.6.0~rc4+dfsg-1 |
fix relies on the new feature that introduced regex/<length> syntax, might be too intrusive for backporting.
https://bugs.php.net/bug.php?id=67705