User: Password:
|
|
Subscribe / Log in / New account

Mageia alert MGASA-2014-0142 (file)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2014-0142: Updated file packages fix security vulnerabilities
Date:  Mon, 31 Mar 2014 21:34:43 +0200
Message-ID:  <20140331193443.CB1E95CA89@valstar.mageia.org>

MGASA-2014-0142 - Updated file packages fix security vulnerabilities Publication date: 31 Mar 2014 URL: http://advisories.mageia.org/MGASA-2014-0142.html Type: security Affected Mageia releases: 3 CVE: CVE-2013-7345 Description: The BEGIN regular expression in the awk script detector in magic/Magdir/commands in file before 5.15 uses multiple wildcards with unlimited repetitions, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted ASCII file that triggers a large amount of backtracking, as demonstrated via a file with many newline characters (CVE-2013-7345). References: - https://bugs.mageia.org/show_bug.cgi?id=13105 - https://lists.fedoraproject.org/pipermail/package-announc... - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7345 SRPMS: - 3/core/file-5.12-8.3.mga3


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds