Hi Zed, (all),

Thanks for forwarding the error. I've applied some fixes for these CVE's.
Being a library, I think it is a bit difficult to report a warning (at
least there is no API call to get this out).

I've added bounds checking on populating the h->gchord and h->drum
variables, and conceptually it will just skip any additional drum/chord
flags after 80 have been reached (in practice this might be only 40 as a
number '1' if appended to each if it does not already exist).

Also, I've committed + synced some other bugs in libmodplug (some
evaluation might be needed whether a CVE is needed for some of them as
well).

https://sourceforge.net/p/modplug-xmms/git/ci/master/tree/

Also, for the purposes of packaging, I've split out libmodplug into its own
git tree.
https://github.com/Konstanty/libmodplug

Let me know if you notice any problems with any of these patches,

Konstanty


On Wed, Aug 14, 2013 at 11:07 AM, Zed Pobre <z...@resonant.org> wrote:

> Hi Konstanty, this is your friendly Debian maintainer.
>
> I had a security issue in libmodplug sent to me, and I wanted to make
> sure you saw it:
>
> On Mon, Aug 12, 2013 at 08:24:33AM +0200, Moritz Muehlenhoff wrote:
> > Hi,
> > please see
> http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/
> >
> > For the CVE assignments:
> > http://seclists.org/oss-sec/2013/q3/343
>
> At first glance, it looks like the first one can be solved just by
> replacing 'j+1' with '(j+1) || j' (though maybe it would be better to
> explicitly check to see if someone is attempting an overflow and exit
> with a warning instead), but on the others I'm afraid I don't know
> where to start.  Can you work out what the real maximum size is that
> can be generated by those attacks and just up the buffer to that, or
> is there something more systemic involved?
>
> Regards,
>
> --
> Zed Pobre <z...@resonant.org> a.k.a. Zed Pobre <z...@debian.org>
> PGP key and fingerprint available on finger; encrypted mail welcomed.
>

Reply via email to