From ${URL} : The readString function in util/read.c and util/old/read.c in libming 0.4.8 allows attackers to cause a denial of service via a large file that is mishandled by listswf, listaction, etc. This occurs because of an integer overflow that leads to a memory allocation error. References: http://seclists.org/fulldisclosure/2017/May/106 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
https://github.com/libming/libming/commit/6eca133ee9985c298186cbe05f888082c30bf2d9
https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=85ec0fe12f825538a27506b28f9c5368e6a942d9 Stabilization will happen as part of bug 614010.
the patch looks to be incomplete: https://github.com/libming/libming/commit/befb7439c2cf4768bcca09651d6325e8f078e992
@maintainers, please clean vulnerable =media-libs/ming-0.4.7. GLSA Vote: No
Tree is clean: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=98b0a157384de0841eae9f36be08122ffd31a3cd