MGASA-2019-0133

Source
https://advisories.mageia.org/MGASA-2019-0133.html
Import Source
https://advisories.mageia.org/MGASA-2019-0133.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2019-0133
Related
Published
2019-04-05T18:12:59Z
Modified
2019-04-05T17:37:49Z
Summary
Updated cfitsio packages fix security vulnerability
Details

CVE-2018-3846: Unsafe use of sprintf() can allow a remote unauthenticated attacker to execute arbitrary code CVE-2018-3848: Stack-based buffer overflow in ffghbn() allows for potential code execution CVE-2018-3849: Stack-based buffer overflow in ffghtb() allows for potential code execution

References
Credits

Affected packages

Mageia:6 / cfitsio

Package

Name
cfitsio
Purl
pkg:rpm/mageia/cfitsio?arch=source&distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.430-1.1.mga6

Ecosystem specific

{
    "section": "core"
}