{"id":"MGASA-2014-0537","summary":"Updated file packages fix security vulnerabilities","details":"Updated file packages fix security vulnerabilities:\n\nThomas Jarosch of Intra2net AG reported that using the file command on a\nspecially-crafted ELF binary could lead to a denial of service due to\nuncontrolled resource consumption (CVE-2014-8116).\n\nThomas Jarosch of Intra2net AG reported that using the file command on a\nspecially-crafted ELF binary could lead to a denial of service due to\nuncontrolled recursion (CVE-2014-8117).\n","modified":"2026-04-16T06:23:28.846833426Z","published":"2014-12-19T15:06:35Z","upstream":["CVE-2014-8116","CVE-2014-8117"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2014-0537.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=14818"},{"type":"WEB","url":"http://openwall.com/lists/oss-security/2014/12/16/2"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1171580"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1174606"}],"affected":[{"package":{"name":"file","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/file?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.16-1.9.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0537.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}