Your message dated Fri, 15 Nov 2024 15:32:28 +0000
with message-id <e1tbyja-0046hh...@fasolo.debian.org>
and subject line Bug#1086443: fixed in mpg123 1.31.2-1+deb12u1
has caused the Debian Bug report #1086443,
regarding mpg123: CVE-2024-10573: buffer overflow involving "Frankenstein 
streams" in versions before 1.32.8
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1086443: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086443
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: mpg123
Version: 0.59f-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: Debian Security Team <t...@security.debian.org>
Control: fixed -1 1.32.8-1

Forwarding this from
<https://www.openwall.com/lists/oss-security/2024/10/30/2>:

> There is possible buffer overflow
> (writing of decoded PCM samples beyond allocated output buffer) for
> streams that change output properties together with certain usage of
> libmpg123. This needed seeking around in the stream (including scanning
> it before actual decoding) to trigger. So, your usual web radio stream
> as obvious attack vector is unlikely, as you won't seek around in it.
> If you do work with stream dumps, usage of MPG123_NO_FRANKENSTEIN or
> the --no-frankenstein option to the mpg123 application is a workaround
> to avoid the formerly dangerous situation in earlier mpg123 releases.
> This also means that mpg123 will not decode streams of concatenated
> files with either varying format or leading Info frames past the first
> track anymore.
…
> Exploitation of this is not trivial, but I cannot rule out the
> possibility of gaining code execution.
…
> Basically any version of mpg123 is affected by this, at least those
> that explicitly support so-called Frankenstein streams.

There is currently no CVE ID allocated.

    smcv

--- End Message ---
--- Begin Message ---
Source: mpg123
Source-Version: 1.31.2-1+deb12u1
Done: Salvatore Bonaccorso <car...@debian.org>

We believe that the bug you reported is fixed in the latest version of
mpg123, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1086...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <car...@debian.org> (supplier of updated mpg123 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 10 Nov 2024 16:26:42 +0100
Source: mpg123
Architecture: source
Version: 1.31.2-1+deb12u1
Distribution: bookworm-security
Urgency: high
Maintainer: Debian Multimedia Maintainers <debian-multimedia@lists.debian.org>
Changed-By: Salvatore Bonaccorso <car...@debian.org>
Closes: 1086443
Changes:
 mpg123 (1.31.2-1+deb12u1) bookworm-security; urgency=high
 .
   * Non-maintainer upload by the Security Team.
   * Fix buffer overflow (Frankenstein's Monster) (CVE-2024-10573)
     (Closes: #1086443)
Checksums-Sha1: 
 f72cc4b128c40446dabd6c9876d78f9000b107ba 2789 mpg123_1.31.2-1+deb12u1.dsc
 47c76d468261da20a8894656d3cd71456a92624a 1093881 mpg123_1.31.2.orig.tar.bz2
 7d2cd7c71a80a48b577b56c6689e4117a987c7a1 833 mpg123_1.31.2.orig.tar.bz2.asc
 cf9239c2ffa5cc49a2ad5a54714218722cdee3f0 33620 
mpg123_1.31.2-1+deb12u1.debian.tar.xz
Checksums-Sha256: 
 a67b2daf33ecf2d2a720e0cd721ac44828f1edee644abac34d8022819abbbb1a 2789 
mpg123_1.31.2-1+deb12u1.dsc
 b17f22905e31f43b6b401dfdf6a71ed11bb7d056f68db449d70b9f9ae839c7de 1093881 
mpg123_1.31.2.orig.tar.bz2
 c5626e0dfba78b7e5766616ad5acc90e6729510ab0d86276a25ee46bef96902a 833 
mpg123_1.31.2.orig.tar.bz2.asc
 9fc7eeeb4be67525fb7901022955b646832f095499612672ad7c24a1b3303599 33620 
mpg123_1.31.2-1+deb12u1.debian.tar.xz
Files: 
 d6cadf17985486269b61b2d64d998702 2789 sound optional 
mpg123_1.31.2-1+deb12u1.dsc
 7aa9b41b70826fe8edd743202e488433 1093881 sound optional 
mpg123_1.31.2.orig.tar.bz2
 a64934fac9d7b0573da71e21337bb9d5 833 sound optional 
mpg123_1.31.2.orig.tar.bz2.asc
 66d247c1bda3f234e95e60de8a654755 33620 sound optional 
mpg123_1.31.2-1+deb12u1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=tS4P
-----END PGP SIGNATURE-----

Attachment: pgpgI0HT338hx.pgp
Description: PGP signature


--- End Message ---

Reply via email to