|Description||file before 5.19 does not properly restrict the amount of data read during a regex search, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted file that triggers backtracking during processing of an awk rule. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7345.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)|
|References||DLA-50-1, DLA-67-1, DSA-3008-1, DSA-3021-1|
Vulnerable and fixed packages
The table below lists information on source packages.
|file (PTS)||stretch (security), stretch||1:5.30-1+deb9u3||fixed|
|buster, buster (security)||1:5.35-4+deb10u1||fixed|
The information below is based on the following data on fixed versions.
fix relies on the new feature that introduced regex/<length> syntax, might be too intrusive for backporting.