MGASA-2014-0440

Source
https://advisories.mageia.org/MGASA-2014-0440.html
Import Source
https://advisories.mageia.org/MGASA-2014-0440.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2014-0440
Related
Published
2014-11-02T13:14:49Z
Modified
2014-11-02T13:05:26Z
Summary
Updated pulseaudio package fixes RTP remote crash vulnerability
Details

PulseAudio versions shipped in Mageia 3 and 4 were vulnerable to a remote RTP attack which could crash the PulseAudio server simply by sending an empty UDP packet.

Additionally, the version of PulseAudio shipped in Mageia 4 was a pre-release version of PulseAudio v5 and has been updated to the official final version.

References
Credits

Affected packages

Mageia:3 / pulseaudio

Package

Name
pulseaudio
Purl
pkg:rpm/mageia/pulseaudio?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0-7.1.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:4 / pulseaudio

Package

Name
pulseaudio
Purl
pkg:rpm/mageia/pulseaudio?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.0-1.mga4

Ecosystem specific

{
    "section": "core"
}