MGASA-2017-0070

Source
https://advisories.mageia.org/MGASA-2017-0070.html
Import Source
https://advisories.mageia.org/MGASA-2017-0070.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2017-0070
Related
Published
2017-03-03T10:09:43Z
Modified
2017-03-03T09:59:28Z
Summary
Updated ming packages fix security vulnerability
Details

Global-buffer-overflow in printMP3Headers. (CVE-2016-9264)

Divide-by-zero in printMP3Headers. (CVE-2016-9265)

Left shift in listmp3.c. (CVE-2016-9266)

Heap-based buffer overflow in _iprintf. (CVE-2016-9827)

NULL pointer dereference in dumpBuffer. (CVE-2016-9828)

Heap-based buffer overflow in parseSWF_DEFINEFONT. (CVE-2016-9829)

Heap-based buffer overflow in parseSWF_RGBA. (CVE-2016-9831)

References
Credits

Affected packages

Mageia:5 / ming

Package

Name
ming
Purl
pkg:rpm/mageia/ming?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.4.5-8.1.mga5

Ecosystem specific

{
    "section": "core"
}