CVE-2017-12954 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12954): The gig::Region::GetSampleFromWavePool function in gig.cpp in libgig 4.0.0 allows remote attackers to cause a denial of service (invalid memory read and application crash) via a crafted gig file. CVE-2017-12953 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12953): The gig::Instrument::UpdateRegionKeyTable function in gig.cpp in libgig 4.0.0 allows remote attackers to cause a denial of service (invalid memory write and application crash) via a crafted gig file. CVE-2017-12952 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12952): The LoadString function in helper.h in libgig 4.0.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted gig file. CVE-2017-12951 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12951): The gig::DimensionRegion::CreateVelocityTable function in gig.cpp in libgig 4.0.0 allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted gig file. CVE-2017-12950 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12950): The gig::Region::Region function in gig.cpp in libgig 4.0.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted gig file. @Maintainers could you please confirm if prior versions are affected? Thank you
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=c3da343f8e19dd2b95b178aed3de6ec85cdc5470 commit c3da343f8e19dd2b95b178aed3de6ec85cdc5470 Author: Andreas Sturmlechner <asturm@gentoo.org> AuthorDate: 2018-09-14 19:43:32 +0000 Commit: Andreas Sturmlechner <asturm@gentoo.org> CommitDate: 2018-09-14 19:49:12 +0000 media-libs/libgig: 4.1.0 version bump, EAPI-7, use https Bug: https://bugs.gentoo.org/634878 Package-Manager: Portage-2.3.49, Repoman-2.3.10 media-libs/libgig/Manifest | 1 + media-libs/libgig/libgig-4.1.0.ebuild | 37 +++++++++++++++++++++++++++++++++++ 2 files changed, 38 insertions(+)
x86 stable
amd64 stable. Maintainer(s), please cleanup. Security, please vote.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=893ad6617685e206c0d1ca8916cac0d893df5165 commit 893ad6617685e206c0d1ca8916cac0d893df5165 Author: Andreas Sturmlechner <asturm@gentoo.org> AuthorDate: 2018-09-30 16:06:59 +0000 Commit: Andreas Sturmlechner <asturm@gentoo.org> CommitDate: 2018-09-30 16:06:59 +0000 media-libs/libgig: Security cleanup Bug: https://bugs.gentoo.org/634878 Signed-off-by: Andreas Sturmlechner <asturm@gentoo.org> Package-Manager: Portage-2.3.50, Repoman-2.3.11 media-libs/libgig/Manifest | 2 -- media-libs/libgig/libgig-3.3.0.ebuild | 39 ----------------------------- media-libs/libgig/libgig-4.0.0-r1.ebuild | 42 -------------------------------- 3 files changed, 83 deletions(-)