blob: d495abe5c3a1765fee0c54cc449bd604a51d6156 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200801-08">
<title>libcdio: User-assisted execution of arbitrary code</title>
A buffer overflow vulnerability has been discovered in libcdio.
<product type="ebuild">libcdio</product>
<announced>January 20, 2008</announced>
<revised>January 20, 2008: 01</revised>
<package name="dev-libs/libcdio" auto="yes" arch="*">
<unaffected range="ge">0.78.2-r4</unaffected>
<vulnerable range="lt">0.78.2-r4</vulnerable>
libcdio is a library for accessing CD-ROM and CD images.
Devon Miller reported a boundary error in the "print_iso9660_recurse()"
function in files cd-info.c and iso-info.c when processing long
filenames within Joliet images.
<impact type="normal">
A remote attacker could entice a user to open a specially crafted ISO
image in the cd-info and iso-info applications, resulting in the
execution of arbitrary code with the privileges of the user running the
application. Applications linking against shared libraries of libcdio
are not affected.
There is no known workaround at this time.
All libcdio users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/libcdio-0.78.2-r4&quot;</code>
<uri link="">CVE-2007-6613</uri>
<metadata tag="requester" timestamp="Tue, 01 Jan 2008 22:05:45 +0000">
<metadata tag="submitter" timestamp="Tue, 08 Jan 2008 21:42:57 +0000">
<metadata tag="bugReady" timestamp="Tue, 15 Jan 2008 17:44:04 +0000">