MGASA-2014-0321

Source
https://advisories.mageia.org/MGASA-2014-0321.html
Import Source
https://advisories.mageia.org/MGASA-2014-0321.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0321
Related
Published
2014-08-06T10:31:11Z
Modified
2014-08-06T10:20:22Z
Summary
Updated eet packages fix security vulnerability
Details

Integer overflow in the LZ4 algorithm implementation on 32-bit platforms might allow context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted Literal Run that would be improperly handled by programs not complying with an API limitation (CVE-2014-4611).

The eet package bundles the LZ4 implementation and has been patched to correct this flaw.

References
Credits

Affected packages

Mageia:3 / eet

Package

Name
eet
Purl
pkg:rpm/mageia/eet?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.5-2.1.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:4 / eet

Package

Name
eet
Purl
pkg:rpm/mageia/eet?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.10-1.1.mga4

Ecosystem specific

{
    "section": "core"
}