MGASA-2022-0316

Source
https://advisories.mageia.org/MGASA-2022-0316.html
Import Source
https://advisories.mageia.org/MGASA-2022-0316.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2022-0316
Related
Published
2022-09-02T19:59:37Z
Modified
2022-09-02T19:07:09Z
Summary
Updated ytnef packages fix security vulnerability
Details

In ytnef 1.9.3, the TNEFSubjectHandler function in lib/ytnef.c allows remote attackers to cause a denial-of-service (and potentially code execution) due to a double free which can be triggered via a crafted file. (CVE-2021-3403) In ytnef 1.9.3, the SwapWord function in lib/ytnef.c allows remote attackers to cause a denial-of-service (and potentially code execution) due to a heap buffer overflow which can be triggered via a crafted file. (CVE-2021-3404)

References
Credits

Affected packages

Mageia:8 / ytnef

Package

Name
ytnef
Purl
pkg:rpm/mageia/ytnef?arch=source&distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0-1.mga8

Ecosystem specific

{
    "section": "core"
}