First published: Tue Jan 13 2015(Updated: )
Sergey "Shnatsel" Davidoff reported a heap-based buffer overflow in Vala Gstreamer bindings in the Gst.MapInfo() function. Further details are available in the following Red Hat bug: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED EOL - All Vala programs that use Gst.MapInfo() are vulnerable to heap buffer overflow due to a bug in Vala bindings for GStreamer" href="show_bug.cgi?id=1177840">https://bugzilla.redhat.com/show_bug.cgi?id=1177840</a> This issue was also reported via: <a href="https://bugzilla.gnome.org/show_bug.cgi?id=678663">https://bugzilla.gnome.org/show_bug.cgi?id=678663</a> and fixed in the following commit: <a href="https://git.gnome.org/browse/vala/commit/?id=3092537db65887e24a3d3e87a27caf9c5295e4f7">https://git.gnome.org/browse/vala/commit/?id=3092537db65887e24a3d3e87a27caf9c5295e4f7</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME Vala | ||
Moonlight |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1181404 is considered high due to the heap-based buffer overflow vulnerability.
To fix REDHAT-BUG-1181404, you should update the affected GStreamer and GNOME Vala packages to their latest versions.
REDHAT-BUG-1181404 affects GNOME Vala and GStreamer software implementations.
The vulnerability in REDHAT-BUG-1181404 is caused by a heap-based buffer overflow in the Gst.MapInfo() function.
A workaround for REDHAT-BUG-1181404 involves avoiding the use of the Gst.MapInfo() function until a patch is applied.