Bug 155387 - HelixPlayer buffer overflow
Summary: HelixPlayer buffer overflow
Keywords:
Status: CLOSED RAWHIDE
Alias: None
Product: Fedora
Classification: Fedora
Component: HelixPlayer
Version: rawhide
Hardware: All
OS: Linux
medium
urgent
Target Milestone: ---
Assignee: John (J5) Palmieri
QA Contact:
URL:
Whiteboard: impact=critical,public=20050419,repor...
Depends On:
Blocks: FC4Blocker
TreeView+ depends on / blocked
 
Reported: 2005-04-19 20:59 UTC by Josh Bressers
Modified: 2013-03-13 04:48 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2005-04-26 21:02:11 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Josh Bressers 2005-04-19 20:59:03 UTC
+++ This bug was initially created as a clone of Bug #155386 +++

+++ This bug was initially created as a clone of Bug #153931 +++

We have been informed of a buffer overflow issue in the version of HelixPlayer
we ship.  A malicious RAM file can overflow a buffer and execute arbitrary code
on a victims machine.

Comment 1 Ray Strode [halfline] 2005-04-25 19:43:04 UTC
John says that this needs to be fixed so that it will compile with nptl
threads/gcc4.

Comment 2 John (J5) Palmieri 2005-04-26 21:02:11 UTC
The fix is in, I tested it and it is built in Rawhide


Note You need to log in before you can comment on or make changes to this bug.