MGASA-2017-0192

Source
https://advisories.mageia.org/MGASA-2017-0192.html
Import Source
https://advisories.mageia.org/MGASA-2017-0192.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2017-0192
Related
Published
2017-06-28T10:01:20Z
Modified
2017-06-28T09:46:16Z
Summary
Updated yodl packages fix security vulnerability
Details

Invalid memory read in queue_push could lead to Denial of service (CVE-2016-10375).

References
Credits

Affected packages

Mageia:5 / yodl

Package

Name
yodl
Purl
pkg:rpm/mageia/yodl?arch=source&distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.00.0-7.1.mga5

Ecosystem specific

{
    "section": "core"
}