Security
Headlines
HeadlinesLatestCVEs

Headline

Debian Security Advisory 5811-1

Debian Linux Security Advisory 5811-1 - An out-of-bounds write vulnerability when handling crafted streams was discovered in mpg123, a real time MPEG 1.0/2.0/2.5 audio player/decoder for layers 1, 2 and 3, which could result in the execution of arbitrary code.

Packet Storm
#vulnerability#web#linux#debian
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512- -------------------------------------------------------------------------Debian Security Advisory DSA-5811-1                   [email protected]://www.debian.org/security/                     Salvatore BonaccorsoNovember 11, 2024                     https://www.debian.org/security/faq- -------------------------------------------------------------------------Package        : mpg123CVE ID         : CVE-2024-10573Debian Bug     : 1086443An out-of-bounds write vulnerability when handling crafted streams wasdiscovered in mpg123, a real time MPEG 1.0/2.0/2.5 audio player/decoderfor layers 1, 2 and 3, which could result in the execution of arbitrarycode.For the stable distribution (bookworm), this problem has been fixed inversion 1.31.2-1+deb12u1.We recommend that you upgrade your mpg123 packages.For the detailed security status of mpg123 please refer to its securitytracker page at:https://security-tracker.debian.org/tracker/mpg123Further information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: https://www.debian.org/security/Mailing list: [email protected] PGP SIGNATURE-----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HcPy-----END PGP SIGNATURE-----

Related news

Ubuntu Security Notice USN-7092-2

Ubuntu Security Notice 7092-2 - USN-7092-1 fixed a vulnerability in mpg123. Bastien Roucariès discovered that the fix was incomplete on Ubuntu 20.04 LTS. This update fixes the problem. It was discovered that mpg123 incorrectly handled certain mp3 files. If a user or automated system were tricked into opening a specially crafted mp3 file, a remote attacker could use this issue to cause mpg123 to crash, resulting in a denial of service, or possibly execute arbitrary code.

Ubuntu Security Notice USN-7092-1

Ubuntu Security Notice 7092-1 - It was discovered that mpg123 incorrectly handled certain mp3 files. If a user or automated system were tricked into opening a specially crafted mp3 file, a remote attacker could use this issue to cause mpg123 to crash, resulting in a denial of service, or possibly execute arbitrary code.

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution