Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 620318 (CVE-2017-8782)

Summary: <media-libs/ming-0.4.8-r1: Integer overflow in the readString function
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor CC: graphics+disabled
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://bugzilla.redhat.com/show_bug.cgi?id=1457344
Whiteboard: B3 [noglsa cve]
Package list:
Runtime testing required: ---
Bug Depends on: 614010    
Bug Blocks:    

Description Agostino Sarubbo gentoo-dev 2017-06-01 08:13:36 UTC
From ${URL} :

The readString function in util/read.c and util/old/read.c in libming 0.4.8 allows attackers to cause a denial of service via a large file that is mishandled by listswf, listaction, etc. This occurs 
because of an integer overflow that leads to a memory allocation error.

References:

http://seclists.org/fulldisclosure/2017/May/106


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 2 Thomas Deutschmann (RETIRED) gentoo-dev 2017-06-04 15:39:07 UTC
https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=85ec0fe12f825538a27506b28f9c5368e6a942d9

Stabilization will happen as part of bug 614010.
Comment 3 Agostino Sarubbo gentoo-dev 2017-06-07 06:41:48 UTC
the patch looks to be incomplete:

https://github.com/libming/libming/commit/befb7439c2cf4768bcca09651d6325e8f078e992
Comment 4 Aaron Bauman (RETIRED) gentoo-dev 2017-10-08 20:16:58 UTC
@maintainers, please clean vulnerable =media-libs/ming-0.4.7.

GLSA Vote: No