Lucene search

K
mageiaGentoo FoundationMGASA-2014-0319
HistoryAug 06, 2014 - 2:31 p.m.

Updated readline packages fix security vulnerability

2014-08-0614:31:11
Gentoo Foundation
advisories.mageia.org
5

0.0004 Low

EPSS

Percentile

5.2%

Steve Kemp discovered the _rl_tropen() function in readline insecurely handled a temporary file. This could allow a local attacker to perform symbolic link attacks (CVE-2014-2524). Also, upstream patches have been added to fix an infinite loop in vi input mode, and to fix an issue with slowness when pasting text.

OSVersionArchitecturePackageVersionFilename
Mageia3noarchreadline< 6.2-7.1readline-6.2-7.1.mga3
Mageia4noarchreadline< 6.2-9.1readline-6.2-9.1.mga4

0.0004 Low

EPSS

Percentile

5.2%