LWN.net Logo

Advertisement

GStreamer, Embedded Linux, Android, VoD, Smooth Streaming, DRM, RTSP, HEVC, PulseAudio, OpenGL. Register now to attend.

Advertise here

Mageia alert MGASA-2013-0279 (freeswitch)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2013-0279: Updated freeswitch packages fix security vulnerability
Date:  Thu, 19 Sep 2013 11:32:20 +0200
Message-ID:  <20130919093220.40F085B096@valstar.mageia.org>
Archive-link:  Article, Thread

MGASA-2013-0279 - Updated freeswitch packages fix security vulnerability Publication date: 19 Sep 2013 URL: http://advisories.mageia.org/MGASA-2013-0279.html Type: security Affected Mageia releases: 3 CVE: CVE-2013-2238 Description: In FreeSWITCH before 1.2.12, if the routing configuration includes regular expressions that don't constrain the length of the input, buffer overflows are possible. Since these regular expressions are matched against untrusted input, remote code execution may be possible (CVE-2013-2238). References: - https://bugs.mageia.org/show_bug.cgi?id=10743 - http://openwall.com/lists/oss-security/2013/07/01/11 - http://jira.freeswitch.org/browse/FS-5566 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2238 SRPMS: - 3/core/freeswitch-1.2.12-6.mga3


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds