| From: |
| Mageia Updates <buildsystem-daemon@mageia.org> |
| To: |
| updates-announce@ml.mageia.org |
| Subject: |
| [updates-announce] MGASA-2013-0271: Updated libmodplug packages fixes security vulnerabilities |
| Date: |
| Fri, 13 Sep 2013 22:05:21 +0200 |
| Message-ID: |
| <20130913200521.4F59F4865C@valstar.mageia.org> |
| Archive-link: |
| Article, Thread
|
MGASA-2013-0271 - Updated libmodplug packages fixes security vulnerabilities
Publication date: 13 Sep 2013
URL: http://advisories.mageia.org/MGASA-2013-0271.html
Type: security
Affected Mageia releases: 2, 3
CVE: CVE-2013-4233,
CVE-2013-4234
Description:
An integer overflow within the "abc_set_parts()" function
(src/load_abc.cpp) can be exploited to corrupt heap memory via a specially
crafted ABC file (CVE-2013-4233).
An error within the "abc_MIDI_drum()" and "abc_MIDI_gchord()" functions
(src/load_abc.cpp) can be exploited to cause a buffer overflow via a
specially crafted ABC file (CVE-2013-4234).
References:
- https://bugs.mageia.org/show_bug.cgi?id=11170
- https://secunia.com/advisories/54388/
- http://www.debian.org/security/2013/dsa-2751
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4233
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4234
SRPMS:
- 3/core/libmodplug-0.8.8.4-3.1.mga3
- 2/core/libmodplug-0.8.8.4-1.1.mga2
(
Log in to post comments)