A division by zero flaw was found in the way taglib, a library for reading and editing of meta-data for several audio formats, processed properties of certain MP4 audio files. A remote attacker could provide a specially-crafted MP4 audio file, which once opened in an application linked against taglib, would lead to that application crash. References: [1] http://mail.kde.org/pipermail/taglib-devel/2012-April/002244.html [2] https://bugzilla.novell.com/show_bug.cgi?id=760496 Upstream patch (from [2]): [3] https://github.com/taglib/taglib/commit/cce6ad46c912c4137131c97f67136a3d11881726
This issue affects the version of the taglib package, as shipped with Red Hat Enterprise Linux 6. -- This issue previously affected the version of the taglib package, as shipped with Fedora EPEL 5. Though the issue is scheduled to be corrected in taglib-1.6.1-1.el5.3 version, which is currently in -testing repository. -- This issue previously affected the versions of the taglib package, as shipped with Fedora release of 15 and 16, though -testing repository contains taglib-1.7.2-1.fc16 and taglib-1.7.2-1.fc15 versions respectively, which are correcting this deficiency.
Statement: This issue affects the version of the taglib package as shipped with Red Hat Enterprise Linux 6. The taglib library is used in client applications only though. Red Hat Security Response Team does not consider a user-assisted crash of a client application such as k3b or Totem to be a security issue.