Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 564424 (CVE-2015-8789) - <dev-libs/libebml-1.3.3: Use-after-free vulnerability in EblMaster::Read()
Summary: <dev-libs/libebml-1.3.3: Use-after-free vulnerability in EblMaster::Read()
Status: RESOLVED FIXED
Alias: CVE-2015-8789
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B3 [noglsa]
Keywords:
Depends on: CVE-2015-8790
Blocks:
  Show dependency tree
 
Reported: 2015-10-29 14:33 UTC by Agostino Sarubbo
Modified: 2017-01-15 07:35 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2015-10-29 14:33:17 UTC
From ${URL} :

When the parser encountered a deeply nested element with an infinite size then a following element 
of an upper level was not propagated correctly. Instead the element with the infinite size was 
added into the EBML element tree a second time resulting in memory access after freeing it and 
multiple attempts to free the same memory address during destruction.

Upstream patch:

https://github.com/Matroska-Org/libebml/commit/88409e2a94dd3b40ff81d08bf6d92f486d036b24


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Alexis Ballier gentoo-dev 2015-10-29 21:09:44 UTC
already fixed in 1.3.3 which is good to go stable I think
Comment 2 Agostino Sarubbo gentoo-dev 2015-10-30 08:42:45 UTC
Arches, please test and mark stable:                                                                                                                                                                                                                                           
=dev-libs/libebml-1.3.3                                                                                                                                                                                                                                                        
Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 sparc x86"
Comment 3 Agostino Sarubbo gentoo-dev 2015-10-30 08:45:24 UTC
amd64 stable
Comment 4 Agostino Sarubbo gentoo-dev 2015-10-30 08:46:03 UTC
x86 stable
Comment 5 Jeroen Roovers (RETIRED) gentoo-dev 2015-10-31 06:32:45 UTC
Stable for HPPA PPC64.
Comment 6 Tobias Klausmann (RETIRED) gentoo-dev 2015-11-01 14:49:08 UTC
Stable on alpha.
Comment 7 Agostino Sarubbo gentoo-dev 2015-11-04 14:28:23 UTC
ppc stable
Comment 8 Agostino Sarubbo gentoo-dev 2015-11-05 10:59:58 UTC
sparc stable
Comment 9 Markus Meier gentoo-dev 2015-11-05 20:56:16 UTC
arm stable
Comment 10 Mikle Kolyada (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2015-11-08 00:12:30 UTC
ia64 stable
Comment 11 Aaron Bauman (RETIRED) gentoo-dev 2016-07-04 11:58:03 UTC
@maintainer(s), please cleanup.
Comment 12 Aaron Bauman (RETIRED) gentoo-dev 2016-11-20 05:59:19 UTC
Please clean the vulnerable versions.
Comment 13 Thomas Deutschmann (RETIRED) gentoo-dev 2017-01-14 15:18:51 UTC
GLSA Vote: No

Cleanup PR: https://github.com/gentoo/gentoo/pull/3465