https://blogs.gentoo.org/ago/2017/07/03/mpg123-global-buffer-overflow-in-iii_i_stereo-layer3-c/ http://www.openwall.com/lists/oss-security/2017/06/28/15 NEWS: Some bug fixes in libmpg123, triggered by me asking for it (fuzzers swaying their aim from LAME towards mpg123): Avoid memset(NULL, 0, 0) to calm down the paranoid. Fix bug 252, invalid read of size 1 in ID3v2 parser due to forgotten offset from the frame flag bytes (unnoticed in practice for a long time). Fuzzers are in the house again. This one got CVE-2017-10683. Avoid a mostly harmless conditional jump depending on uninitialised fr->lay in compute_bpf() (mpg123_position()) when track is not ready yet. Fix undefined shifts on signed long mask in layer3.c (worked in practice, never right in theory). Code might be a bit faster now, even. Thanks to Agostino Sarubbo for reporting.
unfortunately the first is not fixed upstream, let's wait.
Fixed here: https://scm.orgis.org/view/mpg123/trunk/src/libmpg123/layer3.c?view=patch&r1=4275&r2=4274&pathrev=4275 It will be in 1.25.2
CVE-2017-11126 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-11126): The III_i_stereo function in libmpg123/layer3.c in mpg123 through 1.25.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted audio file that is mishandled in the code for the "block_type != 2" case, a similar issue to CVE-2017-9870. CVE-2017-10683 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10683): In mpg123 1.25.0, there is a heap-based buffer over-read in the convert_latin1 function in libmpg123/id3.c. A crafted input will lead to a remote denial of service attack.
@ Arches, please test and mark stable: =media-sound/mpg123-1.25.2
arm stable
Stable on alpha.
(In reply to Tobias Klausmann from comment #6) > Stable on alpha. Bullshit. Amd64 stable.
ia64 stable
x86 stable
sparc was dropped to exp. https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=b5901d8f716555a1479f12313a2925fcadd177a9
ppc64 stable
ppc stable
hppa stable
Stabilization done, thank you arches. @Maintainer(s): Please clean the vulnerable version from the tree. Gentoo Security Padawan Kivak
GLSA Vote: No
tree is clean: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=81131d5f55f35fa50854d42b9ab728bb94264820