MGASA-2014-0389

Source
https://advisories.mageia.org/MGASA-2014-0389.html
Import Source
https://advisories.mageia.org/MGASA-2014-0389.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0389
Related
Published
2014-09-26T15:55:04Z
Modified
2014-09-26T15:42:19Z
Summary
Updated perl-Email-Address packages fix security vulnerabilities
Details

Updated perl-Email-Address package fixes security vulnerability:

The parse function in Email::Address module before 1.905 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via an empty quoted string in an RFC 2822 address (CVE-2014-0477).

The Email::Address module before 1.904 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via vectors related to "backtracking into the phrase" (CVE-2014-4720).

References
Credits

Affected packages

Mageia:3 / perl-Email-Address

Package

Name
perl-Email-Address
Purl
pkg:rpm/mageia/perl-Email-Address?arch=source&distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.905.0-1.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:4 / perl-Email-Address

Package

Name
perl-Email-Address
Purl
pkg:rpm/mageia/perl-Email-Address?arch=source&distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.905.0-1.mga4

Ecosystem specific

{
    "section": "core"
}