| Summary: | suricata new security issue CVE-2014-6603 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | Daniel Lucio <luis.daniel.lucio> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | guillomovitch, pterjan |
| Version: | Cauldron | ||
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/615073/ | ||
| Whiteboard: | |||
| Source RPM: | suricata-2.0.2-3.mga5.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2014-10-06 19:28:14 CEST
David Walser
2014-10-06 19:28:36 CEST
CC:
(none) =>
guillomovitch, pterjan Guillaume fixed this in Cauldron with suricata-2.0.4-1.mga5. Thanks Guillaume! We might need more investigation to see if 1.4.x in Mageia 3 and 4 are affected, or we could just update it if it's OK to do so. Version:
Cauldron =>
4 Reading the code in 1.4 and 1.4.7 they don't seem affected as they don't use "\r" to find the end of the string, they just discard it if the version ends up finishing with it. I'll try to get some upstream confirmation. Got confirmation that 1.4 is fine https://twitter.com/Regiteric/status/519226322166763520 Thanks Pascal! Status:
NEW =>
RESOLVED |