Bug 1058451 - (CVE-2017-14407) VUL-0: CVE-2017-14407: mp3gain: A stack-based buffer over-read was discovered in filterYule in gain_analysis.cin MP3Gain version 1.5.2. The vulnerability causes an application crash, whichleads to remote denial of service.
(CVE-2017-14407)
VUL-0: CVE-2017-14407: mp3gain: A stack-based buffer over-read was discovered...
Status: RESOLVED WONTFIX
Classification: openSUSE
Product: openSUSE Distribution
Classification: openSUSE
Component: Other
Leap 42.2
Other Other
: P5 - None : Normal (vote)
: ---
Assigned To: Luigi Baldoni
E-mail List
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2017-09-13 07:39 UTC by Marcus Meissner
Modified: 2018-02-10 18:00 UTC (History)
0 users

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2017-09-13 07:39:21 UTC
CVE-2017-14407

A stack-based buffer over-read was discovered in filterYule in gain_analysis.c
in MP3Gain version 1.5.2. The vulnerability causes an application crash, which
leads to remote denial of service.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14407
https://blogs.gentoo.org/ago/2017/09/08/mp3gain-stack-based-buffer-overflow-in-filteryule-gain_analysis-c/
Comment 1 Luigi Baldoni 2017-09-13 09:26:17 UTC
No longer supported upstream, not worth trying to fix it independently.
Filed (dr#525071).
Comment 2 Swamp Workflow Management 2018-02-10 18:00:27 UTC
This is an autogenerated message for OBS integration:
This bug (1058451) was mentioned in
https://build.opensuse.org/request/show/575251 Factory / mp3gain