Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 631604 (CVE-2017-12797) - <media-sound/mpg123-1.25.6: Integer overflow creates denial of service
Summary: <media-sound/mpg123-1.25.6: Integer overflow creates denial of service
Status: RESOLVED FIXED
Alias: CVE-2017-12797
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: x86 Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://sourceforge.net/p/mpg123/bugs...
Whiteboard: B3 [noglsa cve]
Keywords:
Depends on:
Blocks: CVE-2017-10683, CVE-2017-11126
  Show dependency tree
 
Reported: 2017-09-21 02:48 UTC by Aleksandr Wagner (Kivak)
Modified: 2018-05-08 18:42 UTC (History)
1 user (show)

See Also:
Package list:
=media-sound/mpg123-1.25.6
Runtime testing required: Yes
stable-bot: sanity-check+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Aleksandr Wagner (Kivak) 2017-09-21 02:48:48 UTC
CVE-2017-12797 (https://nvd.nist.gov/vuln/detail/CVE-2017-12797):

Integer overflow in the INT123_parse_new_id3 function in the ID3 parser in mpg123 before 1.25.5 on 32-bit platforms allows remote attackers to cause a denial of service via a crafted file, which triggers a heap-based buffer overflow.

References:

https://sourceforge.net/p/mpg123/bugs/254/
https://sourceforge.net/p/mpg123/mailman/message/35987663/

@Maintainer(s): Please note that only x86 is vulnerable and state when you are ready for stabilization.
Comment 1 Thomas Deutschmann (RETIRED) gentoo-dev 2017-10-19 12:01:23 UTC
x86 stable
Comment 2 Manuel Rüger (RETIRED) gentoo-dev 2017-10-19 12:47:38 UTC
Stable on amd64
Comment 3 Sergei Trofimovich (RETIRED) gentoo-dev 2017-10-20 19:44:25 UTC
ia64 stable
Comment 4 Sergei Trofimovich (RETIRED) gentoo-dev 2017-10-21 10:35:21 UTC
ppc/ppc64 stable
Comment 5 Sergei Trofimovich (RETIRED) gentoo-dev 2017-10-22 17:52:37 UTC
hppa stable
Comment 6 Tobias Klausmann (RETIRED) gentoo-dev 2017-10-22 21:47:43 UTC
Stable on alpha.
Comment 7 Markus Meier gentoo-dev 2017-10-24 20:04:23 UTC
arm stable, all arches done.
Comment 8 Aleksandr Wagner (Kivak) 2017-10-24 20:16:07 UTC
Thank you arches.

@ Maintainer(s): Please clean the vulnerable versions from tree.

@ Security: Please vote on glsa.
Comment 9 Aaron Bauman (RETIRED) gentoo-dev 2017-10-25 00:26:09 UTC
GLSA Vote: No
Comment 10 Aaron Bauman (RETIRED) gentoo-dev 2018-01-19 23:50:36 UTC
Tree is clean.
Comment 11 Larry the Git Cow gentoo-dev 2018-05-08 18:42:56 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=557a30063403e2ace8592cb4fe29a4af6f37ceca

commit 557a30063403e2ace8592cb4fe29a4af6f37ceca
Author:     Rolf Eike Beer <eike@sf-mail.de>
AuthorDate: 2018-05-08 18:18:17 +0000
Commit:     Sergei Trofimovich <slyfox@gentoo.org>
CommitDate: 2018-05-08 18:42:39 +0000

    media-sound/mpg123: stable 1.25.6 for sparc
    
    Bug: https://bugs.gentoo.org/631604
    Package-Manager: Portage-2.3.24, Repoman-2.3.6
    RepoMan-Options: --include-arches="sparc"

 media-sound/mpg123/mpg123-1.25.6.ebuild | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)