Lucene search

K
mageiaGentoo FoundationMGASA-2013-0271
HistorySep 14, 2013 - 12:05 a.m.

Updated libmodplug packages fixes security vulnerabilities

2013-09-1400:05:16
Gentoo Foundation
advisories.mageia.org
7

0.428 Medium

EPSS

Percentile

97.3%

An integer overflow within the “abc_set_parts()” function (src/load_abc.cpp) can be exploited to corrupt heap memory via a specially crafted ABC file (CVE-2013-4233). An error within the “abc_MIDI_drum()” and “abc_MIDI_gchord()” functions (src/load_abc.cpp) can be exploited to cause a buffer overflow via a specially crafted ABC file (CVE-2013-4234).

OSVersionArchitecturePackageVersionFilename
Mageia2noarchlibmodplug< 0.8.8.4-1.1libmodplug-0.8.8.4-1.1.mga2
Mageia3noarchlibmodplug< 0.8.8.4-3.1libmodplug-0.8.8.4-3.1.mga3