MGASA-2015-0030

Source
https://advisories.mageia.org/MGASA-2015-0030.html
Import Source
https://advisories.mageia.org/MGASA-2015-0030.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0030
Related
Published
2015-01-19T16:47:36Z
Modified
2015-01-19T16:38:45Z
Summary
Updated file packages fix security vulnerabilities
Details

Updated file packages fix security vulnerabilities:

Alexander Cherepanov reported that using the file command on a specially-crafted ELF binary could lead to a denial of service due to uncontrolled resource consumption while processing ELF section headers (CVE-2014-9620, CVE-2014-9621).

As part of the fixes, several limits on aspects of the detection were added or tightened, sometimes resulting in messages like "recursion limit exceeded" or "too many program header sections".

To mitigate such shortcomings, these limits are controllable by a new -P, --parameter option in the file program.

References
Credits

Affected packages

Mageia:4 / file

Package

Name
file
Purl
pkg:rpm/mageia/file?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.16-1.10.mga4

Ecosystem specific

{
    "section": "core"
}