CVE-2014-9488

NameCVE-2014-9488
DescriptionThe is_utf8_well_formed function in GNU less before 475 allows remote attackers to have unspecified impact via malformed UTF-8 characters, which triggers an out-of-bounds read.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs780247

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
less (PTS)jessie, jessie (lts)458-3+deb8u2vulnerable
stretch (lts), stretch481-2.1+deb9u1fixed
buster (security), buster, buster (lts)487-0.1+deb10u1fixed
bullseye (security), bullseye551-2+deb11u2fixed
bookworm (security), bookworm590-2.1~deb12u2fixed
sid, trixie643-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
lesssource(unstable)481-1unimportant780247

Notes

https://www.openwall.com/lists/oss-security/2015/03/10/14
https://blog.fuzzing-project.org/3-less-out-of-bounds-read-access-TFPA-0022014.html

Search for package or bug name: Reporting problems