{"id":"MGASA-2021-0351","summary":"Updated libsolv packages fix a security vulnerability","details":"Buffer overflow vulnerability in libsolv 2020-12-13 via the\nSolver * testcase_read(Pool *pool, FILE *fp, const char *testcase, Queue *job,\nchar **resultp, int *resultflagsp function at src/testcase.c: line 2334, which\ncould cause a denial of service (CVE-2021-3200).\n","modified":"2026-02-01T21:55:37.609857Z","published":"2021-07-13T23:43:43Z","related":["CVE-2021-3200"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2021-0351.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=29167"},{"type":"REPORT","url":"https://lists.suse.com/pipermail/sle-security-updates/2021-June/009080.html"}],"affected":[{"package":{"name":"libsolv","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/libsolv?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.7.19-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0351.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}