Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 661582 (CVE-2018-14054, CVE-2018-14325, CVE-2018-14379, CVE-2018-14403) - <media-libs/libmp4v2-2.0.0-r2: Multiple vulnerabilities (CVE-2018-{14054,14403,14379,14325})
Summary: <media-libs/libmp4v2-2.0.0-r2: Multiple vulnerabilities (CVE-2018-{14054,1440...
Status: RESOLVED FIXED
Alias: CVE-2018-14054, CVE-2018-14325, CVE-2018-14379, CVE-2018-14403
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: B3 [noglsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2018-07-19 14:33 UTC by Florian Schuhmacher
Modified: 2021-02-20 19:31 UTC (History)
1 user (show)

See Also:
Package list:
media-libs/libmp4v2-2.0.0-r2
Runtime testing required: ---
nattka: sanity-check+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Florian Schuhmacher 2018-07-19 14:33:35 UTC
A double free exists in the MP4StringProperty class in mp4property.cpp in MP4v2
2.0.0. A dangling pointer is freed again in the destructor once an exception is
triggered.

Gentoo Security Scout
Florian Schuhmacher
Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-03-15 03:49:40 UTC
Patch for this bug (CVE-2018-14054): https://github.com/sergiomb2/libmp4v2/commit/3410bc66fb91f46325ab1d008b6a421dd8240949

More vulnerabilities:

2) CVE-2018-14403:
Description:
"MP4NameFirstMatches in mp4util.cpp in MP4v2 2.0.0 mishandles substrings of atom names, leading to use of an inappropriate data type for associated atoms. The resulting type confusion can cause out-of-bounds memory access."

Patch: https://github.com/sergiomb2/libmp4v2/commit/a94a3372c6ef66a2276cc6cd92f7ec07a9c8bb6b

3) CVE-2018-14379
Description:
"MP4Atom::factory in mp4atom.cpp in MP4v2 2.0.0 incorrectly uses the MP4ItemAtom data type in a certain case where MP4DataAtom is required, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted MP4 file, because access to the data structure has different expectations about layout as a result of this type confusion."

Patch: https://github.com/sergiomb2/libmp4v2/commit/bb920de948c85e3db4a52292ac7250a50e3bfc86

4) CVE-2018-14325 
Description:
"In MP4v2 2.0.0, there is an integer underflow (with resultant memory corruption) when parsing MP4Atom in mp4atom.cpp."

Patch: https://github.com/sergiomb2/libmp4v2/commit/9084868fd9f86bee118001c23171e832f15009f4
Comment 2 Larry the Git Cow gentoo-dev 2020-08-03 00:49:40 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=1560154cd7f50715577cc36e52f8d03a15a80419

commit 1560154cd7f50715577cc36e52f8d03a15a80419
Author:     John Helmert III <jchelmert3@posteo.net>
AuthorDate: 2020-08-03 00:49:30 +0000
Commit:     Sam James <sam@gentoo.org>
CommitDate: 2020-08-03 00:49:30 +0000

    media-libs/libmp4v2: add security patches
    
    Bug: https://bugs.gentoo.org/661582
    Package-Manager: Portage-3.0.0, Repoman-2.3.23
    Signed-off-by: John Helmert III <jchelmert3@posteo.net>
    Closes: https://github.com/gentoo/gentoo/pull/16811
    Signed-off-by: Sam James <sam@gentoo.org>

 .../files/libmp4v2-2.0.0-CVE-2018-14054.patch      | 35 +++++++++++++
 .../files/libmp4v2-2.0.0-CVE-2018-14325.patch      | 60 ++++++++++++++++++++++
 .../files/libmp4v2-2.0.0-CVE-2018-14379.patch      | 33 ++++++++++++
 .../files/libmp4v2-2.0.0-CVE-2018-14403.patch      | 28 ++++++++++
 media-libs/libmp4v2/libmp4v2-2.0.0-r2.ebuild       | 54 +++++++++++++++++++
 5 files changed, 210 insertions(+)
Comment 3 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-08-15 03:37:47 UTC
amd64 done
Comment 4 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-08-15 04:06:55 UTC
arm done
Comment 5 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-08-15 04:41:03 UTC
x86 done
Comment 6 Agostino Sarubbo gentoo-dev 2020-08-16 14:48:57 UTC
sparc stable
Comment 7 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-08-29 12:56:21 UTC
ppc done
Comment 8 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-09-03 00:21:03 UTC
ppc64 stable
Comment 9 Sergei Trofimovich (RETIRED) gentoo-dev 2020-09-06 08:20:01 UTC
hppa stable
Comment 10 Larry the Git Cow gentoo-dev 2020-09-07 22:22:34 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=2a89a8c0b44df34d90bf96ef6541b51bfd115914

commit 2a89a8c0b44df34d90bf96ef6541b51bfd115914
Author:     Sam James <sam@gentoo.org>
AuthorDate: 2020-09-07 22:22:18 +0000
Commit:     Sam James <sam@gentoo.org>
CommitDate: 2020-09-07 22:22:30 +0000

    media-libs/libmp4v2: security cleanup
    
    Bug: https://bugs.gentoo.org/661582
    Package-Manager: Portage-3.0.4, Repoman-3.0.1
    Signed-off-by: Sam James <sam@gentoo.org>

 media-libs/libmp4v2/libmp4v2-2.0.0-r1.ebuild | 50 ----------------------------
 1 file changed, 50 deletions(-)
Comment 11 Thomas Deutschmann (RETIRED) gentoo-dev 2021-02-20 19:31:51 UTC
GLSA Vote: No

Repository is clean, all done!