MGASA-2017-0222

Source
https://advisories.mageia.org/MGASA-2017-0222.html
Import Source
https://advisories.mageia.org/MGASA-2017-0222.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2017-0222
Related
Published
2017-07-28T18:12:15Z
Modified
2017-07-27T20:48:38Z
Summary
Updated valgrind packages fix security vulnerabilities
Details

It was discovered that Valgrind incorectly handled certain string operations. If a user or automated system were tricked into processing a specially crafted binary, a remote attacker could possibly execute arbitrary code (CVE-2016-2226).

It was discovered that Valgrind incorrectly handled parsing certain binaries. If a user or automated system were tricked into processing a specially crafted binary, a remote attacker could use this issue to cause Valgrind to crash, resulting in a denial of service (CVE-2016-4487, CVE-2016-4488, CVE-2016-4489, CVE-2016-4490, CVE-2016-4491, CVE-2016-4492, CVE-2016-4493, CVE-2016-6131).

References
Credits

Affected packages

Mageia:5 / valgrind

Package

Name
valgrind
Purl
pkg:rpm/mageia/valgrind?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.10.1-2.1.mga5

Ecosystem specific

{
    "section": "core"
}