LWN.net Logo

Mageia alert MGASA-2013-0271 (libmodplug)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2013-0271: Updated libmodplug packages fixes security vulnerabilities
Date:  Fri, 13 Sep 2013 22:05:21 +0200
Message-ID:  <20130913200521.4F59F4865C@valstar.mageia.org>
Archive-link:  Article, Thread

MGASA-2013-0271 - Updated libmodplug packages fixes security vulnerabilities Publication date: 13 Sep 2013 URL: http://advisories.mageia.org/MGASA-2013-0271.html Type: security Affected Mageia releases: 2, 3 CVE: CVE-2013-4233, CVE-2013-4234 Description: An integer overflow within the "abc_set_parts()" function (src/load_abc.cpp) can be exploited to corrupt heap memory via a specially crafted ABC file (CVE-2013-4233). An error within the "abc_MIDI_drum()" and "abc_MIDI_gchord()" functions (src/load_abc.cpp) can be exploited to cause a buffer overflow via a specially crafted ABC file (CVE-2013-4234). References: - https://bugs.mageia.org/show_bug.cgi?id=11170 - https://secunia.com/advisories/54388/ - http://www.debian.org/security/2013/dsa-2751 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4233 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4234 SRPMS: - 3/core/libmodplug-0.8.8.4-3.1.mga3 - 2/core/libmodplug-0.8.8.4-1.1.mga2


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds