Bug 2322980 (CVE-2024-10573)
| Summary: | CVE-2024-10573 mpg123: Buffer overflow when writing decoded PCM samples | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
| Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
| Status: | NEW --- | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | Keywords: | Security |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: |
An out-of-bounds write flaw was found in mpg123 when handling crafted streams. When decoding PCM, the libmpg123 may write past the end of a heap-located buffer. Consequently, heap corruption may happen, and arbitrary code execution is not discarded. The complexity required to exploit this flaw is considered high as the payload must be validated by the MPEG decoder and the PCM synth before execution. Additionally, to successfully execute the attack, the user must scan through the stream, making web live stream content (such as web radios) a very unlikely attack vector.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2322981, 2322982, 2322989, 2322983, 2322984, 2322985, 2322986, 2322987, 2322988, 2322990, 2322991 | ||
| Bug Blocks: | |||
|
Description
OSIDB Bzimport
2024-10-31 17:20:00 UTC
Upstream fixes are located at: https://scm.orgis.org/mpg123/branches/1.31-fixes/ This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:11193 https://access.redhat.com/errata/RHSA-2024:11193 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:11242 https://access.redhat.com/errata/RHSA-2024:11242 |