|
|
Subscribe / Log in / New account

Mageia alert MGASA-2016-0358 (mpg123)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2016-0358: Updated mpg123 packages fix security vulnerability
Date:  Wed, 26 Oct 2016 01:12:14 +0200
Message-ID:  <20161025231214.23C269F7A5@duvel.mageia.org>

MGASA-2016-0358 - Updated mpg123 packages fix security vulnerability Publication date: 25 Oct 2016 URL: http://advisories.mageia.org/MGASA-2016-0358.html Type: security Affected Mageia releases: 5 CVE: CVE-2016-1000247 Description: Jerold Hoong discovered a flaw in the id3 tag processing code of libmpg123. A specially crafted mp3 input file could be used to cause a buffer over-read, resulting in a denial of service (CVE-2016-1000247). References: - https://bugs.mageia.org/show_bug.cgi?id=19610 - http://www.mpg123.de/cgi-bin/news.cgi - http://lwn.net/Alerts/703760/ - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10... SRPMS: - 5/core/mpg123-1.20.1-4.1.mga5


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds