MGASA-2015-0015

Source
https://advisories.mageia.org/MGASA-2015-0015.html
Import Source
https://advisories.mageia.org/MGASA-2015-0015.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2015-0015
Related
Published
2015-01-08T12:36:22Z
Modified
2015-01-08T12:29:30Z
Summary
Updated libsndfile packages fix CVE-2014-9496
Details

Updated libsndfile packages fix security vulnerabilities:

libsndfile contains multiple buffer-overflow vulnerabilities in src/sd2.c because it fails to properly bounds-check user supplied input, which may allow an attacker to execute arbitrary code or cause a denial of service (CVE-2014-9496).

libsndfile contains a divide-by-zero error in src/file_io.c which may allow an attacker to cause a denial of service.

References
Credits

Affected packages