CVE-2014-9621

NameCVE-2014-9621
DescriptionThe ELF parser in file 5.16 through 5.21 allows remote attackers to cause a denial of service via a long string.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
file (PTS)bullseye (security), bullseye1:5.39-3+deb11u1fixed
bookworm1:5.44-3fixed
sid, trixie1:5.45-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
filesourcesqueeze(not affected)
filesourcewheezy(not affected)
filesource(unstable)1:5.21+15-1
php5sourcesqueeze(not affected)
php5sourcewheezy(not affected)
php5source(unstable)5.6.5+dfsg-1

Notes

[wheezy] - file <not-affected> (Introduced in 5.16)
[squeeze] - file <not-affected> (Introduced in 5.16)
[wheezy] - php5 <not-affected> (Vulnerable code not present)
[squeeze] - php5 <not-affected> (Vulnerable code not present)
Report: http://mx.gw.com/pipermail/file/2014/001654.html
Fix: https://github.com/file/file/commit/65437cee25199dbd385fb35901bc0011e164276c
Introduced by: https://github.com/file/file/commit/c8451af8ab0c2e2a93ce93b9c68257d31576cc85 (5.16)
readelf.c has been removed in PHP in 5.6.5, see http://php.net/ChangeLog-5.php#5.6.5

Search for package or bug name: Reporting problems