Bug 2115217 (CVE-2022-34927)

Summary: CVE-2022-34927 milkytracker: stack overflow via the component LoaderXM::load
Product: [Other] Security Response Reporter: TEJ RATHI <trathi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED UPSTREAM QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: muep
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A stack based overflow issue was in MilkyTracker in the instrument parsing code in LoaderXM::load. An attacker could exploit this vulnerability by passing a malformed XM module file to an application, thus, corrupting the stack, control program execution flow and gain code execution.
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-08-31 18:55:53 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2115218    
Bug Blocks: 2114859    

Description TEJ RATHI 2022-08-04 07:28:10 UTC
MilkyTracker v1.03.00 was discovered to contain a stack overflow via the component LoaderXM::load. This vulnerability is triggered when the program is supplied a crafted XM module file.

https://github.com/milkytracker/MilkyTracker/commit/3a5474f9102cbdc10fbd9e7b1b2c8d3f3f45d91b
https://github.com/milkytracker/MilkyTracker/issues/275

Comment 1 TEJ RATHI 2022-08-04 07:28:29 UTC
Created milkytracker tracking bugs for this issue:

Affects: fedora-all [bug 2115218]

Comment 2 Product Security DevOps Team 2022-08-31 18:55:51 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.