[Bug 1082274] New: VUL-0: CVE-2017-12911: mp3gain: stack memory corruption when opening a crafted MP3 file
http://bugzilla.opensuse.org/show_bug.cgi?id=1082274 Bug ID: 1082274 Summary: VUL-0: CVE-2017-12911: mp3gain: stack memory corruption when opening a crafted MP3 file Classification: openSUSE Product: openSUSE Distribution Version: Leap 42.3 Hardware: Other URL: https://smash.suse.de/issue/200624/ OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: aloisio@gmx.com Reporter: abergmann@suse.com QA Contact: security-team@suse.de Found By: Security Response Team Blocker: --- CVE-2017-12911 The "apetag.c" file in MP3Gain 1.5.2.r2 has a vulnerability which results in a stack memory corruption when opening a crafted MP3 file. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-12911 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12911 -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1082274 http://bugzilla.opensuse.org/show_bug.cgi?id=1082274#c1 Alexander Bergmann <abergmann@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |abergmann@suse.com --- Comment #1 from Alexander Bergmann <abergmann@suse.com> --- openSUSE:Factory has version mp3gain-1.6.1 already. Not sure if this version is still affected. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1082274 http://bugzilla.opensuse.org/show_bug.cgi?id=1082274#c2 --- Comment #2 from Luigi Baldoni <aloisio@gmx.com> --- The one in Factory contains a patch with this commit https://sourceforge.net/p/mp3gain/code/ci/4963fd9aedac00bcf051617e4d88f73ad5... . According to the developer, there is no public PoC to verify it though. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1082274 http://bugzilla.opensuse.org/show_bug.cgi?id=1082274#c3 Luigi Baldoni <aloisio@gmx.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution|--- |WONTFIX --- Comment #3 from Luigi Baldoni <aloisio@gmx.com> --- As reported above, apetag.c has been heavily patched, plus CVE-2017-12911 does not supply a proof of concept. I'm filing this under "hearsay" until contrary evidence emerges. -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@novell.com