GLSA 202305-01: AtomicParsley: Multiple Vulnerabilities
Severity: | normal |
Title: | AtomicParsley: Multiple Vulnerabilities |
Date: | 05/03/2023 |
Bugs: |
|
ID: | 202305-01 |
Synopsis
Multiple vulnerabilities have been discovered in AtomicParsley, the worst of which could result in arbitrary code execution.Background
AtomicParsley is a command line program for manipulating iTunes-style metadata in MPEG4 files.
Affected packages
Package | Vulnerable | Unaffected | Architecture(s) |
---|---|---|---|
media-video/atomicparsley-wez | <= 0.9.6 | All supported architectures | |
media-video/atomicparsley | < 0.9.6_p20210715_p151551 | >= 0.9.6_p20210715_p151551 | All supported architectures |
Description
Multiple vulnerabilities have been discovered in AtomicParsley. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Workaround
Users can pass only trusted input to AtomicParsley.
Resolution
Previously, the "wez" AtomicParsley fork was packaged in Gentoo as media-video/atomicparsley-wez. This fork is now packaged as media-video/atomicparsley, so users of the fork's package should now depclean it:
# emerge --ask --depclean "media-video/atomicparsley-wez"
All AtomicParsley users should upgrade to the latest version, which is a packaging of the "wez" AtomicParsley fork:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-video/atomicparsley-0.9.6_p20210715_p151551"
References
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.