[Bug 1058447] New: VUL-0: CVE-2017-14411: mp3gain: A stack-based buffer overflow was discovered in copy_mp in interface.c inmpglibDBL, as used in MP3Gain version 1.5.2. The vulnerability causes anout-of-bounds write, which leads to remote denial of service or possib
http://bugzilla.opensuse.org/show_bug.cgi?id=1058447 Bug ID: 1058447 Summary: VUL-0: CVE-2017-14411: mp3gain: A stack-based buffer overflow was discovered in copy_mp in interface.c inmpglibDBL, as used in MP3Gain version 1.5.2. The vulnerability causes anout-of-bounds write, which leads to remote denial of service or possib Classification: openSUSE Product: openSUSE Distribution Version: Leap 42.2 Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Other Assignee: aloisio@gmx.com Reporter: meissner@suse.com QA Contact: qa-bugs@suse.de Found By: Security Response Team Blocker: --- CVE-2017-14411 A stack-based buffer overflow was discovered in copy_mp in interface.c in mpglibDBL, as used in MP3Gain version 1.5.2. The vulnerability causes an out-of-bounds write, which leads to remote denial of service or possibly code execution. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14411 https://blogs.gentoo.org/ago/2017/09/08/mp3gain-stack-based-buffer-overflow-... -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1058447 http://bugzilla.opensuse.org/show_bug.cgi?id=1058447#c1 Luigi Baldoni <aloisio@gmx.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution|--- |WONTFIX --- Comment #1 from Luigi Baldoni <aloisio@gmx.com> --- No longer supported upstream, not worth trying to fix it independently. Filed (dr#525071). -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@novell.com