Bug#745301: libmms: CVE-2014-2892: heap-based buffer overflow

Sebastian Ramacher sramacher at debian.org
Fri Apr 25 14:41:36 UTC 2014


On 2014-04-25 16:40:28, Sebastian Ramacher wrote:
> Hi Security Team,
> 
> On 2014-04-20 11:59:23, Salvatore Bonaccorso wrote:
> > Source: libmms
> > Version: 0.6-1
> > Severity: grave
> > Tags: security upstream fixed-upstream
> > 
> > Hi,
> > 
> > the following vulnerability was published for libmms.
> > 
> > CVE-2014-2892[0]:
> > heap-based buffer overflow
> 
> Please find attached the debdiffs for squeeze and wheezy. Please let me know if
> it's okay to upload them to the squeeze-security and wheezy-security.

And here are the patches.

Cheers
-- 
Sebastian Ramacher
-------------- next part --------------
diff -u libmms-0.6/debian/changelog libmms-0.6/debian/changelog
--- libmms-0.6/debian/changelog
+++ libmms-0.6/debian/changelog
@@ -1,3 +1,11 @@
+libmms (0.6-1+squeeze2) squeeze-security; urgency=high
+
+  * Team upload.
+  * debian/patches/0002-CVE-2014-2892.patch: Apply upstream patch for
+    CVE-2014-2892. (Closes: #745301)
+
+ -- Sebastian Ramacher <sramacher at debian.org>  Fri, 25 Apr 2014 16:14:59 +0200
+
 libmms (0.6-1+squeeze1) stable; urgency=low
 
   * Apply patch by Paul Burton cherry-picked from upstream git to fix
diff -u libmms-0.6/debian/patches/series libmms-0.6/debian/patches/series
--- libmms-0.6/debian/patches/series
+++ libmms-0.6/debian/patches/series
@@ -4,0 +5 @@
+0002-CVE-2014-2892.patch
only in patch2:
unchanged:
--- libmms-0.6.orig/debian/patches/0002-CVE-2014-2892.patch
+++ libmms-0.6/debian/patches/0002-CVE-2014-2892.patch
@@ -0,0 +1,22 @@
+Description: Fix heap based buffer overrun
+Bug-Debian: https://bugs.debian.org/745301
+Origin: upstream,
+ http://sourceforge.net/p/libmms/code/ci/03bcfccc22919c72742b7338d02859962861e0e8
+Last-Update: 2014-04-25
+
+diff --git a/src/mmsh.c b/src/mmsh.c
+index f7cee4a..bca7fb8 100644
+--- a/src/mmsh.c
++++ b/src/mmsh.c
+@@ -307,7 +307,10 @@ static int get_answer (mms_io_t *io, mmsh_t *this) {
+         len = 0;
+       }
+     } else {
+-      len ++;
++      if (++len >= sizeof(this->buf)) {
++        lprintf("answer too large\n");
++        return 0;
++      }
+     }
+   }
+   if (this->stream_type == MMSH_UNKNOWN) {
-------------- next part --------------
diff -Nru libmms-0.6.2/debian/changelog libmms-0.6.2/debian/changelog
--- libmms-0.6.2/debian/changelog	2012-02-14 11:17:26.000000000 +0100
+++ libmms-0.6.2/debian/changelog	2014-04-25 16:15:06.000000000 +0200
@@ -1,3 +1,11 @@
+libmms (0.6.2-3+deb7u1) wheezy-security; urgency=high
+
+  * Team upload.
+  * debian/patches/0002-CVE-2014-2892.patch: Apply upstream patch for
+    CVE-2014-2892. (Closes: #745301)
+
+ -- Sebastian Ramacher <sramacher at debian.org>  Fri, 25 Apr 2014 16:14:59 +0200
+
 libmms (0.6.2-3) unstable; urgency=low
 
   * Team upload.
diff -Nru libmms-0.6.2/debian/gbp.conf libmms-0.6.2/debian/gbp.conf
--- libmms-0.6.2/debian/gbp.conf	2011-01-21 11:13:39.000000000 +0100
+++ libmms-0.6.2/debian/gbp.conf	2014-04-25 16:09:10.000000000 +0200
@@ -1,6 +1,6 @@
 [DEFAULT]
 upstream-branch = upstream
-debian-branch = master
+debian-branch = wheezy
 upstream-tag = upstream/%(version)s
 debian-tag = debian/%(version)s
 pristine-tar = True
diff -Nru libmms-0.6.2/debian/patches/0002-CVE-2014-2892.patch libmms-0.6.2/debian/patches/0002-CVE-2014-2892.patch
--- libmms-0.6.2/debian/patches/0002-CVE-2014-2892.patch	1970-01-01 01:00:00.000000000 +0100
+++ libmms-0.6.2/debian/patches/0002-CVE-2014-2892.patch	2014-04-25 16:10:12.000000000 +0200
@@ -0,0 +1,22 @@
+Description: Fix heap based buffer overrun
+Bug-Debian: https://bugs.debian.org/745301
+Origin: upstream,
+ http://sourceforge.net/p/libmms/code/ci/03bcfccc22919c72742b7338d02859962861e0e8
+Last-Update: 2014-04-25
+
+diff --git a/src/mmsh.c b/src/mmsh.c
+index f7cee4a..bca7fb8 100644
+--- a/src/mmsh.c
++++ b/src/mmsh.c
+@@ -307,7 +307,10 @@ static int get_answer (mms_io_t *io, mmsh_t *this) {
+         len = 0;
+       }
+     } else {
+-      len ++;
++      if (++len >= sizeof(this->buf)) {
++        lprintf("answer too large\n");
++        return 0;
++      }
+     }
+   }
+   if (this->stream_type == MMSH_UNKNOWN) {
diff -Nru libmms-0.6.2/debian/patches/series libmms-0.6.2/debian/patches/series
--- libmms-0.6.2/debian/patches/series	2012-02-14 11:03:15.000000000 +0100
+++ libmms-0.6.2/debian/patches/series	2014-04-25 16:10:12.000000000 +0200
@@ -1 +1,2 @@
 0001-Fixup-bswap.h-macros.patch
+0002-CVE-2014-2892.patch
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: Digital signature
URL: <http://lists.alioth.debian.org/pipermail/pkg-multimedia-maintainers/attachments/20140425/dc5ef92d/attachment.sig>


More information about the pkg-multimedia-maintainers mailing list