Mageia alert MGASA-2019-0046 (perl-Email-Address)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2019-0046: Updated perl-Email-Address package fixes security vulnerability | |
Date: | Wed, 23 Jan 2019 16:51:05 +0100 | |
Message-ID: | <20190123155105.545739FB41@duvel.mageia.org> |
MGASA-2019-0046 - Updated perl-Email-Address package fixes security vulnerability Publication date: 23 Jan 2019 URL: https://advisories.mageia.org/MGASA-2019-0046.html Type: security Affected Mageia releases: 6 CVE: CVE-2018-12558 Description: The parse() method in the Email::Address module through 1.912 for Perl can consume a large amount of resources on specially prepared input, leading to Denial of Service. Prepared special input that caused this problem contained 30 form-field characters ("\f") (CVE-2018-12558). References: - https://bugs.mageia.org/show_bug.cgi?id=23208 - https://lists.fedoraproject.org/archives/list/package-ann... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1... SRPMS: - 6/core/perl-Email-Address-1.912.0-1.mga6