CVE-2014-3538

NameCVE-2014-3538
Descriptionfile before 5.19 does not properly restrict the amount of data read during a regex search, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted file that triggers backtracking during processing of an awk rule. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7345.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-50-1, DLA-67-1, DSA-3008-1, DSA-3021-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
file (PTS)buster1:5.35-4+deb10u2fixed
buster (security)1:5.35-4+deb10u1fixed
bullseye (security), bullseye1:5.39-3+deb11u1fixed
bookworm1:5.44-3fixed
trixie1:5.45-2fixed
sid1:5.45-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
filesourcesqueeze5.04-5+squeeze7DLA-50-1
filesourcewheezy5.11-2+deb7u4DSA-3021-1
filesource(unstable)1:5.19-1
php5sourcesqueeze5.3.3-7+squeeze22DLA-67-1
php5sourcewheezy5.4.4-14+deb7u13DSA-3008-1
php5source(unstable)5.6.0~rc4+dfsg-1

Notes

fix relies on the new feature that introduced regex/<length> syntax, might be too intrusive for backporting.
https://bugs.php.net/bug.php?id=67705

Search for package or bug name: Reporting problems