CVE-2014-3538
Published: 3 July 2014
file before 5.19 does not properly restrict the amount of data read during a regex search, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted file that triggers backtracking during processing of an awk rule. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7345.
Notes
Author | Note |
---|---|
mdeslaur | This fix introduces new functionnality and is too intrusive to backport to lucid. |
Priority
Status
Package | Release | Status |
---|---|---|
file Launchpad, Ubuntu, Debian |
lucid |
Ignored
|
precise |
Released
(5.09-2ubuntu0.4)
|
|
saucy |
Released
(5.11-2ubuntu4.3)
|
|
trusty |
Released
(1:5.14-2ubuntu3.1)
|
|
upstream |
Released
(1:5.19-1)
|
|
Patches: upstream: https://github.com/file/file/commit/758e066df72fb1ac08d2eea91ddc3973d259e991 upstream: https://github.com/file/file/commit/74cafd7de9ec99a14f4480927580e501c8f852c3 upstream: https://github.com/file/file/commit/71a8b6c0d758acb0f73e2e51421a711b5e9d6668 upstream: https://github.com/file/file/commit/69a5a43b3b71f53b0577f41264a073f495799610 upstream: https://github.com/file/file/commit/4a284c89d6ef11aca34da65da7d673050a5ea320 |