{"id":"MGASA-2016-0057","summary":"Updated radicale packages fix CVE-2015-8748","details":"Updated radicale package fixes security vulnerabilities:\n\nIf an attacker is able to authenticate with a user name like `.*', he can\nbypass read/write limitations imposed by regex-based rules, including the\nbuilt-in rules `owner_write' (read for everybody, write for the calendar\nowner) and `owner_only' (read and write for the calendar owner)\n(CVE-2015-8748).\n\nThe radicale package has been updated to version 1.1.1, fixing this issue and\nseveral other security issues.\n","modified":"2026-03-25T17:45:33.157969Z","published":"2016-02-09T13:05:25Z","related":["CVE-2015-8748"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0057.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=17452"},{"type":"REPORT","url":"http://radicale.org/news/"},{"type":"REPORT","url":"https://www.debian.org/security/2016/dsa-3462"}],"affected":[{"package":{"name":"radicale","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/radicale?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.1.1-1.1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0057.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}