Package: flac123 Version: 0.0.9-5 Severity: grave Tags: security patch -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
CVE-2007-3507 [0]: "Stack-based buffer overflow in the local__vcentry_parse_value function in vorbiscomment.c in flac123 (aka flac-tools or flac) before 0.0.10 allows user-assisted remote attackers to execute arbitrary code via a large comment value_length." This vulnerability introduces a security hole allowing access to the accounts of users who use the package. The original advisory is available [1], but this has been fixed upstream as the only change in 0.0.10. I've attached a drop-in dpatch I created from the diff between 0.0.9 and 0.0.10; the patch applies and the package builds fine, but I have not done further testing. Please mention the CVE in your changelog. Thanks, Alec [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3507 [1] http://www.isecpartners.com/advisories/2007-002-flactools.txt - -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 2.6.18-4-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFGjmyhAud/2YgchcQRAkMzAJ97PKB93lfQfIEx7syd3zKKa1zf+ACcDHiQ lh7IDIl6dYrBxA4H67WEoM0= =SM9U -----END PGP SIGNATURE-----
CVE-2007-3507.dpatch
Description: application/shellscript