Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 661582 (CVE-2018-14054) - media-libs/libmp4v2: Double free in the MP4StringProperty class in mp4property.cpp (CVE-2018-14054)
Summary: media-libs/libmp4v2: Double free in the MP4StringProperty class in mp4propert...
Alias: CVE-2018-14054
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
Whiteboard: C4 [upstream/ebuild cve]
Depends on:
Reported: 2018-07-19 14:33 UTC by Florian Schuhmacher
Modified: 2020-04-26 04:06 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Florian Schuhmacher 2018-07-19 14:33:35 UTC
A double free exists in the MP4StringProperty class in mp4property.cpp in MP4v2
2.0.0. A dangling pointer is freed again in the destructor once an exception is

Gentoo Security Scout
Florian Schuhmacher
Comment 1 Sam James (sec padawan) 2020-03-15 03:49:40 UTC
Patch for this bug (CVE-2018-14054):

More vulnerabilities:

2) CVE-2018-14403:
"MP4NameFirstMatches in mp4util.cpp in MP4v2 2.0.0 mishandles substrings of atom names, leading to use of an inappropriate data type for associated atoms. The resulting type confusion can cause out-of-bounds memory access."


3) CVE-2018-14379
"MP4Atom::factory in mp4atom.cpp in MP4v2 2.0.0 incorrectly uses the MP4ItemAtom data type in a certain case where MP4DataAtom is required, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted MP4 file, because access to the data structure has different expectations about layout as a result of this type confusion."


4) CVE-2018-14325 
"In MP4v2 2.0.0, there is an integer underflow (with resultant memory corruption) when parsing MP4Atom in mp4atom.cpp."