Описание
[Heap Buffer Overflow in GNOME localsearch MP3 Extractor]
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 3.8.2-12 |
| jammy | DNE | |
| noble | DNE | |
| questing | DNE | |
| upstream | released | 3.11 |
Показывать по
10
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-apps/bionic | not-affected | code not present |
| esm-infra/focal | not-affected | code not present |
| jammy | released | 3.3.3-0ubuntu0.20.04.4 |
| noble | released | 3.7.1-1ubuntu0.1 |
| questing | released | 3.8.2-4ubuntu2.1 |
| upstream | released | 3.11 |
Показывать по
10
Связанные уязвимости
CVSS3: 5.6
redhat
около 2 месяцев назад
A flaw was found in the GNOME localsearch (previously known as tracker-miners) MP3 Extractor `tracker-extract-mp3` component. A remote attacker could exploit this heap buffer overflow vulnerability by providing a specially crafted MP3 file containing malformed ID3 tags. This incorrect length calculation during the parsing of performer tags can lead to a read beyond the allocated buffer, potentially causing a Denial of Service (DoS) due to a crash or enabling information disclosure.