Bug 695420 (CVE-2011-1574)
Summary: | CVE-2011-1574 libmodplug: ReadS3M stack overflow vulnerability | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vincent Danen <vdanen> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | extras-orphan, ville.skytta |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2015-07-29 12:36:23 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 695421, 695422, 695455, 696507 | ||
Bug Blocks: |
Description
Vincent Danen
2011-04-11 17:12:14 UTC
Created libmodplug tracking bugs for this issue Affects: fedora-all [bug 695421] Affects: epel-all [bug 695422] This also affects gstreamer-plugins on Red Hat Enterprise Linux 4 and schismtracker in Fedora (they have embedded modplug). Created schismtracker tracking bugs for this issue Affects: fedora-all [bug 695455] This was assigned the name CVE-2011-1574. (In reply to comment #2) > This also affects gstreamer-plugins on Red Hat Enterprise Linux 4 and > schismtracker in Fedora (they have embedded modplug). schismtracker in F-15+ doesn't seem to contain the embedded libmodplug any longer. I haven't tried to check if their new implementation would be affected by the same issue though. I've poked around and it doesn't look like schismtracker in F15 has any similar issues (at least not that I can spot). It does look like it can handle s3m files still, but doesn't use modplug and hasn't really copied the code that I can see (at least not the affected code). So this would just be relevant for F13 and F14 from what I can see. The EPEL-5 and EPEL-6 updates have sat in testing for 14 days, without any feedback. I don't have a system to test them with myself; perhaps someone receiving these mails could help? This issue has been addressed in following products: Red Hat Enterprise Linux 4 Via RHSA-2011:0477 https://rhn.redhat.com/errata/RHSA-2011-0477.html |