Mageia alert MGASA-2014-0389 (perl-Email-Address)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2014-0389: Updated perl-Email-Address packages fix security vulnerabilities | |
Date: | Fri, 26 Sep 2014 17:55:19 +0200 | |
Message-ID: | <20140926155519.BE8D35C75B@valstar.mageia.org> |
MGASA-2014-0389 - Updated perl-Email-Address packages fix security vulnerabilities Publication date: 26 Sep 2014 URL: http://advisories.mageia.org/MGASA-2014-0389.html Type: security Affected Mageia releases: 3, 4 CVE: CVE-2014-0477, CVE-2014-4720 Description: Updated perl-Email-Address package fixes security vulnerability: The parse function in Email::Address module before 1.905 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via an empty quoted string in an RFC 2822 address (CVE-2014-0477). The Email::Address module before 1.904 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via vectors related to "backtracking into the phrase" (CVE-2014-4720). References: - https://bugs.mageia.org/show_bug.cgi?id=13541 - https://www.debian.org/security/2014/dsa-2969 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0477 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4720 SRPMS: - 4/core/perl-Email-Address-1.905.0-1.mga4 - 3/core/perl-Email-Address-1.905.0-1.mga3