MGASA-2016-0026

Source
https://advisories.mageia.org/MGASA-2016-0026.html
Import Source
https://advisories.mageia.org/MGASA-2016-0026.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2016-0026
Related
Published
2016-01-20T17:53:26Z
Modified
2016-01-20T17:41:23Z
Summary
Updated encfs packages fix security vulnerability
Details

A local attacker can utilize a possible buffer overflow in the encodeName method of StreamNameIO and BlockNameIO to execute arbitrary code or cause a Denial of Service. Also multiple weak cryptographics practices have been found in encfs (CVE-2014-3462)

References
Credits

Affected packages

Mageia:5 / encfs

Package

Name
encfs
Purl
pkg:rpm/mageia/encfs?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.5-1.mga5

Ecosystem specific

{
    "section": "core"
}