]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core-contrib.git/commit
mpg123: fix CVE-2024-10573
authorZhang Peng <peng.zhang1.cn@windriver.com>
Thu, 13 Mar 2025 14:22:35 +0000 (22:22 +0800)
committerSteve Sakoman <steve@sakoman.com>
Thu, 13 Mar 2025 16:19:58 +0000 (09:19 -0700)
commita227b80e29c5ba5d963acaa4ddb4b9ad45483bd5
tree020c138c11a8f8e51861bab052ba9186810a7862
parent31d67739490ec2abf92328b3f0ceff22ce5d4974
mpg123: fix CVE-2024-10573

CVE-2024-10573:
An out-of-bounds write flaw was found in mpg123 when handling crafted streams.
When decoding PCM, the libmpg123 may write past the end of a heap-located buffer.
Consequently, heap corruption may happen, and arbitrary code execution is not
discarded. The complexity required to exploit this flaw is considered high as
the payload must be validated by the MPEG decoder and the PCM synth before execution.
Additionally, to successfully execute the attack, the user must scan through the
stream, making web live stream content (such as web radios) a very unlikely attack vector.

Reference: [https://nvd.nist.gov/vuln/detail/CVE-2024-10573]

Upstream patches: [svn://scm.orgis.org/mpg123/branches/1.31-fixes@5442]

Signed-off-by: Zhang Peng <peng.zhang1.cn@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
meta/recipes-multimedia/mpg123/mpg123/CVE-2024-10573.patch [new file with mode: 0644]
meta/recipes-multimedia/mpg123/mpg123_1.29.3.bb