Security
Headlines
HeadlinesLatestCVEs

Headline

Debian Security Advisory 5811-1

Debian Linux Security Advisory 5811-1 - An out-of-bounds write vulnerability when handling crafted streams was discovered in mpg123, a real time MPEG 1.0/2.0/2.5 audio player/decoder for layers 1, 2 and 3, which could result in the execution of arbitrary code.

Packet Storm
#vulnerability#web#linux#debian
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512- -------------------------------------------------------------------------Debian Security Advisory DSA-5811-1                   [email protected]://www.debian.org/security/                     Salvatore BonaccorsoNovember 11, 2024                     https://www.debian.org/security/faq- -------------------------------------------------------------------------Package        : mpg123CVE ID         : CVE-2024-10573Debian Bug     : 1086443An out-of-bounds write vulnerability when handling crafted streams wasdiscovered in mpg123, a real time MPEG 1.0/2.0/2.5 audio player/decoderfor layers 1, 2 and 3, which could result in the execution of arbitrarycode.For the stable distribution (bookworm), this problem has been fixed inversion 1.31.2-1+deb12u1.We recommend that you upgrade your mpg123 packages.For the detailed security status of mpg123 please refer to its securitytracker page at:https://security-tracker.debian.org/tracker/mpg123Further information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: https://www.debian.org/security/Mailing list: [email protected] PGP SIGNATURE-----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HcPy-----END PGP SIGNATURE-----

Related news

Ubuntu Security Notice USN-7092-1

Ubuntu Security Notice 7092-1 - It was discovered that mpg123 incorrectly handled certain mp3 files. If a user or automated system were tricked into opening a specially crafted mp3 file, a remote attacker could use this issue to cause mpg123 to crash, resulting in a denial of service, or possibly execute arbitrary code.

Packet Storm: Latest News

Ivanti EPM Agent Portal Command Execution