A use-after-free vulnerability exists in the way MKVToolNix MKVINFO v25.0.0 handles the MKV (matroska) file format. A specially crafted MKV file can cause arbitrary code execution in the context of the current user. External References: https://talosintelligence.com/vulnerability_reports/TALOS-2018-0694
Created mkvtoolnix tracking bugs for this issue: Affects: epel-all [bug 1644260] Affects: fedora-all [bug 1644259]
What's the point of this bug? We have 27.0.0 in Fedora and EPEL7 already.
Ah, your description is misleading. It looks like versions up to 28.1.0 are affected: https://mkvtoolnix.download/doc/NEWS.md # Version 28.2.0 "The Awakening" 2018-10-25 ## Bug fixes * mkvmerge, mkvinfo, mkvextract, mkvpropedit, MKVToolNix GUI's info tool & chapter editor: fixed a case of memory being accessed after it had been freed earlier. This can be triggered by specially crafted Matroska files and lead to arbitrary code execution. The vulnerability was reported as Cisco TALOS 2018-0694 on 2018-10-25.