{"id":"MGASA-2015-0097","summary":"Updated mapserver packages fix CVE-2013-7262 and packaging issues","details":"Updated mapserver packages fix security vulnerability:\n\nSQL injection vulnerability in the msPostGISLayerSetTimeFilter function in\nmappostgis.c in MapServer before 6.4.1, when a WMS-Time service is used,\nallows remote attackers to execute arbitrary SQL commands via a crafted\nstring in a PostGIS TIME filter (CVE-2013-7262).\n\nThe mapserver package has been updated to version 6.2.2, which fixes this\nissue and several other bugs, including some packaging issues which\nprevented it from working anyway.\n","modified":"2026-04-16T06:23:21.257256258Z","published":"2015-03-06T18:08:57Z","upstream":["CVE-2013-7262"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2015-0097.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=15363"},{"type":"WEB","url":"http://www.mapserver.org/development/changelog/changelog-6-2-2.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1048688"}],"affected":[{"package":{"name":"mapserver","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/mapserver?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.2.2-1.2.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0097.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}