{"id":"MGASA-2014-0440","summary":"Updated pulseaudio package fixes RTP remote crash vulnerability","details":"PulseAudio versions shipped in Mageia 3 and 4 were vulnerable to a\nremote RTP attack which could crash the PulseAudio server simply by\nsending an empty UDP packet.\n\nAdditionally, the version of PulseAudio shipped in Mageia 4 was a\npre-release version of PulseAudio v5 and has been updated to the\nofficial final version.\n","modified":"2026-01-30T19:56:30.112596Z","published":"2014-11-02T13:14:49Z","related":["CVE-2014-3970"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2014-0440.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=13483"}],"affected":[{"package":{"name":"pulseaudio","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/pulseaudio?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0-7.1.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0440.json"}},{"package":{"name":"pulseaudio","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/pulseaudio?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.0-1.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0440.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}