MGASA-2014-0441

Source
https://advisories.mageia.org/MGASA-2014-0441.html
Import Source
https://advisories.mageia.org/MGASA-2014-0441.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0441
Related
Published
2014-11-12T09:56:47Z
Modified
2014-11-12T09:40:45Z
Summary
Updated php packages fix security vulnerability
Details

An out-of-bounds read flaw was found in file's donote() function in the way the file utility determined the note headers of a elf file. This could possibly lead to file executable crash (CVE-2014-3710).

PHP uses an embedded copy of file's libmagic library, and was therefore affected. It has been patched to correct this issue.

This update also provides an updated php-timezonedb.

References
Credits

Affected packages

Mageia:3 / php

Package

Name
php
Purl
pkg:rpm/mageia/php?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.34-1.1.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:3 / php-timezonedb

Package

Name
php-timezonedb
Purl
pkg:rpm/mageia/php-timezonedb?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2014.9-1.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:4 / php

Package

Name
php
Purl
pkg:rpm/mageia/php?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.5.18-1.2.mga4

Ecosystem specific

{
    "section": "core"
}

Mageia:4 / php-timezonedb

Package

Name
php-timezonedb
Purl
pkg:rpm/mageia/php-timezonedb?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2014.9-1.mga4

Ecosystem specific

{
    "section": "core"
}