[Secure-testing-commits] r58772 - in data: . CVE

Raphaël Hertzog hertzog at moszumanska.debian.org
Thu Dec 21 10:02:22 UTC 2017


Author: hertzog
Date: 2017-12-21 10:02:22 +0000 (Thu, 21 Dec 2017)
New Revision: 58772

Modified:
   data/CVE/list
   data/dla-needed.txt
Log:
Reclassify mp3gain CVE since I marked the package as unsupported

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2017-12-21 09:51:33 UTC (rev 58771)
+++ data/CVE/list	2017-12-21 10:02:22 UTC (rev 58772)
@@ -17164,24 +17164,31 @@
 	NOT-FOR-US: D-Link
 CVE-2017-14412 (An invalid memory write was discovered in copy_mp in interface.c in ...)
 	- mp3gain <removed>
+	[wheezy] - mp3gain <end-of-life>
 	NOTE: https://blogs.gentoo.org/ago/2017/09/08/mp3gain-invalid-memory-write-in-copy_mp-mpglibdblinterface-c/
 CVE-2017-14411 (A stack-based buffer overflow was discovered in copy_mp in interface.c ...)
 	- mp3gain <removed>
+	[wheezy] - mp3gain <end-of-life>
 	NOTE: https://blogs.gentoo.org/ago/2017/09/08/mp3gain-stack-based-buffer-overflow-in-copy_mp-mpglibdblinterface-c/
 CVE-2017-14410 (A buffer over-read was discovered in III_i_stereo in layer3.c in ...)
 	- mp3gain <removed>
+	[wheezy] - mp3gain <end-of-life>
 	NOTE: https://blogs.gentoo.org/ago/2017/09/08/mp3gain-global-buffer-overflow-in-iii_i_stereo-mpglibdbllayer3-c/
 CVE-2017-14409 (A buffer overflow was discovered in III_dequantize_sample in layer3.c ...)
 	- mp3gain <removed>
+	[wheezy] - mp3gain <end-of-life>
 	NOTE: https://blogs.gentoo.org/ago/2017/09/08/mp3gain-global-buffer-overflow-in-iii_dequantize_sample-mpglibdbllayer3-c/
 CVE-2017-14408 (A stack-based buffer over-read was discovered in dct36 in layer3.c in ...)
 	- mp3gain <removed>
+	[wheezy] - mp3gain <end-of-life>
 	NOTE: https://blogs.gentoo.org/ago/2017/09/08/mp3gain-stack-based-buffer-overflow-in-dct36-mpglibdbllayer3-c/
 CVE-2017-14407 (A stack-based buffer over-read was discovered in filterYule in ...)
 	- mp3gain <removed>
+	[wheezy] - mp3gain <end-of-life>
 	NOTE: https://blogs.gentoo.org/ago/2017/09/08/mp3gain-stack-based-buffer-overflow-in-filteryule-gain_analysis-c/
 CVE-2017-14406 (A NULL pointer dereference was discovered in sync_buffer in interface.c ...)
 	- mp3gain <removed>
+	[wheezy] - mp3gain <end-of-life>
 	NOTE: https://blogs.gentoo.org/ago/2017/09/08/mp3gain-null-pointer-dereference-in-sync_buffer-mpglibdblinterface-c/
 CVE-2017-14405 (The EyesOfNetwork web interface (aka eonweb) 5.1-0 allows remote ...)
 	NOT-FOR-US: EyesOfNetwork (EON)
@@ -21198,9 +21205,11 @@
 	RESERVED
 CVE-2017-12912 (The "mpglibDBL/layer3.c" file in MP3Gain 1.5.2.r2 has a vulnerability ...)
 	- mp3gain <removed>
+	[wheezy] - mp3gain <end-of-life>
 	NOTE: https://drive.google.com/open?id=0B9DojFnTUSNGeS1hZlJkeGVkYlU
 CVE-2017-12911 (The "apetag.c" file in MP3Gain 1.5.2.r2 has a vulnerability which ...)
 	- mp3gain <removed>
+	[wheezy] - mp3gain <end-of-life>
 	NOTE: https://drive.google.com/open?id=0B9DojFnTUSNGeS1hZlJkeGVkYlU
 CVE-2017-12910 (SQL injection vulnerability in massmail.php in NexusPHP 1.5 allows ...)
 	NOT-FOR-US: NexusPHP

Modified: data/dla-needed.txt
===================================================================
--- data/dla-needed.txt	2017-12-21 09:51:33 UTC (rev 58771)
+++ data/dla-needed.txt	2017-12-21 10:02:22 UTC (rev 58772)
@@ -59,16 +59,7 @@
   NOTE: 20171120: wip, currently working on it with upstream, might take a while
   NOTE: Some issues currently in upstream's bug tracker are missing a CVE number, so number of issues might increase in the next weeks
 --
-mp3gain
-  NOTE: Successfully reproduced CVE-2017-144{09, 07} but couldn't reproduce CVE-2017-144{06, 08, 10, 11, 12} (valgrind in Wheezy, gcc+asan in Jessie).
-  NOTE: Bundles a modified, old version of mpg123 under mpglibDBL/, so issues might be already discovered/fixed in mpg123 or lame:
-  NOTE: For CVE-2017-14409, https://security-tracker.debian.org/tracker/CVE-2017-9872 might be of interest, files are very similar
-  NOTE: adapting/writing patches seems to be very time consuming, mp3gain is dead upstream so this might be a candidate for no-dsa -- Hugo Lefeuvre
---
 ohcount
-  NOTE: No upstream bug tracker found (except on old copies of the code on
-  NOTE: github). Pinged sourceforge project owner with sourceforge's
-  NOTE: integrated messaging feature. -- Raphaël Hertzog
 --
 python2.6
   NOTE: webbrowser.py as binary is hard to exploit, but when using it as an import then it may be possible to trigger something. Should be fixed to be on the safe side even though it is not an urgent problem.




More information about the Secure-testing-commits mailing list