CVE-2017-11705 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11705): A memory leak was found in the function parseSWF_SHAPEWITHSTYLE in util/parser.c in Ming 0.4.8, which allows attackers to cause a denial of service via a crafted file. References: http://somevulnsofadlab.blogspot.ca/2017/07/libmingmemory-leak-in.html https://github.com/libming/libming/issues/71 CVE-2017-11704 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11704): A heap-based buffer over-read was found in the function decompileIF in util/decompile.c in Ming 0.4.8, which allows attackers to cause a denial of service via a crafted file. References: http://somevulnsofadlab.blogspot.ca/2017/07/libmingheap-buffer-overflow-in.html https://github.com/libming/libming/issues/76 CVE-2017-11703 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11703): A memory leak vulnerability was found in the function parseSWF_DOACTION in util/parser.c in Ming 0.4.8, which allows attackers to cause a denial of service via a crafted file. References: https://github.com/libming/libming/issues/72 http://somevulnsofadlab.blogspot.ca/2017/07/libmingmemory-leak-in-parseswfdoaction.html
71 and 72 are still open upstream. No fix in master.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=f85984054ed9f49d7245234ee6aa9e737607f148 commit f85984054ed9f49d7245234ee6aa9e737607f148 Author: Aaron Bauman <bman@gentoo.org> AuthorDate: 2019-08-04 19:29:04 +0000 Commit: Aaron Bauman <bman@gentoo.org> CommitDate: 2019-08-04 19:29:04 +0000 profiles/package.mask: add media-libs/ming Bug: https://bugs.gentoo.org/626412 Bug: https://bugs.gentoo.org/650006 Bug: https://bugs.gentoo.org/651574 Bug: https://bugs.gentoo.org/661152 Bug: https://bugs.gentoo.org/678804 Signed-off-by: Aaron Bauman <bman@gentoo.org> profiles/package.mask | 5 +++++ 1 file changed, 5 insertions(+)
The package has been removed.