A format string vulnerability was found in mpv, potentially resulting in arbitrary code execution.
Package | media-video/mpv on all architectures |
---|---|
Affected versions | < 0.33.1 |
Unaffected versions | >= 0.33.1 |
Video player based on MPlayer/mplayer2.
mpv uses untrusted input within format strings.
A remote attacker could entice a user to open a specially crafted m3u playlist file using mpv, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.
There is no known workaround at this time.
All mpv users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-video/mpv-0.33.1"
Release date
July 20, 2021
Latest revision
July 20, 2021: 1
Severity
normal
Exploitable
remote
Bugzilla entries