Bug 155387 - HelixPlayer buffer overflow
HelixPlayer buffer overflow
Status: CLOSED RAWHIDE
Product: Fedora
Classification: Fedora
Component: HelixPlayer (Show other bugs)
rawhide
All Linux
medium Severity urgent
: ---
: ---
Assigned To: John (J5) Palmieri
impact=critical,public=20050419,repor...
: Security
Depends On:
Blocks: FC4Blocker
  Show dependency treegraph
 
Reported: 2005-04-19 16:59 EDT by Josh Bressers
Modified: 2013-03-13 00:48 EDT (History)
4 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2005-04-26 17:02:11 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Josh Bressers 2005-04-19 16:59:03 EDT
+++ This bug was initially created as a clone of Bug #155386 +++

+++ This bug was initially created as a clone of Bug #153931 +++

We have been informed of a buffer overflow issue in the version of HelixPlayer
we ship.  A malicious RAM file can overflow a buffer and execute arbitrary code
on a victims machine.
Comment 1 Ray Strode [halfline] 2005-04-25 15:43:04 EDT
John says that this needs to be fixed so that it will compile with nptl
threads/gcc4.
Comment 2 John (J5) Palmieri 2005-04-26 17:02:11 EDT
The fix is in, I tested it and it is built in Rawhide

Note You need to log in before you can comment on or make changes to this bug.