- Added patches:
* CVE-2017-11332.patch: Fixed the startread function in wav.c, which allowed
remote attackers to cause a DoS (divide-by-zero) via a crafted wav file.
(CVE-2017-11332 bsc#1081140)
* CVE-2017-11358.patch: Fixed the read_samples function in hcom.c, which
allowed remote attackers to cause a DoS (invalid memory read) via a crafted
hcom file. (CVE-2017-11358 bsc#1081141)
* CVE-2017-11359.patch: Fixed the wavwritehdr function in wav.c, which
allowed remote attackers to cause a DoS (divide-by-zero) when converting a
a crafted snd file to a wav file. (CVE-2017-11359 bsc#1081142)
* CVE-2017-15370.patch: Fixed a heap-based buffer overflow in the ImaExpandS
function of ima_rw.c, which allowed remote attackers to cause a DoS during
conversion of a crafted audio file. (CVE-2017-15370 bsc#1063439)
* CVE-2017-15371.patch: Fixed an assertion abort in the function
sox_append_comment() in formats.c, which allowed remote attackers to cause
a DoS during conversion of a crafted audio file. (CVE-2017-15371
bsc#1063450)
* CVE-2017-15372.patch: Fixed a stack-based buffer overflow in the
lsx_ms_adpcm_block_expand_i function of adpcm.c, which allowed remote
attackers to cause a DoS during conversion of a crafted audio file.
(CVE-2017-15372 bsc#1063456)
* CVE-2017-15642.patch: Fixed an Use-After-Free vulnerability in
lsx_aiffstartread in aiff.c, which could be triggered by an attacker by
providing a malformed AIFF file. (CVE-2017-15642 bsc#1064576)
* CVE-2017-18189.patch: Fixed a NULL pointer dereference triggered by a
corrupt header specifying zero channels in the startread function in
xa.c, which allowed remote attackers to cause a DoS (CVE-2017-18189
bsc#1081146).
- Removed sox-doublefree.patch
OBS-URL: https://build.opensuse.org/request/show/576951
OBS-URL: https://build.opensuse.org/package/show/multimedia:apps/sox?expand=0&rev=38
27 lines
987 B
Diff
27 lines
987 B
Diff
From 6cb44a44b9eda6b321ccdbf6483348d4a9798b00 Mon Sep 17 00:00:00 2001
|
|
From: Mans Rullgard <mans@mansr.com>
|
|
Date: Sun, 5 Nov 2017 16:43:35 +0000
|
|
Subject: [PATCH] hcom: fix crash on input with corrupt dictionary
|
|
(CVE-2017-11358)
|
|
|
|
---
|
|
src/hcom.c | 5 +++++
|
|
1 file changed, 5 insertions(+)
|
|
|
|
diff --git a/src/hcom.c b/src/hcom.c
|
|
index c62b020c..1b0e09dd 100644
|
|
--- a/src/hcom.c
|
|
+++ b/src/hcom.c
|
|
@@ -150,6 +150,11 @@ static int startread(sox_format_t * ft)
|
|
lsx_debug("%d %d",
|
|
p->dictionary[i].dict_leftson,
|
|
p->dictionary[i].dict_rightson);
|
|
+ if ((unsigned) p->dictionary[i].dict_leftson >= dictsize ||
|
|
+ (unsigned) p->dictionary[i].dict_rightson >= dictsize) {
|
|
+ lsx_fail_errno(ft, SOX_EHDR, "Invalid dictionary");
|
|
+ return SOX_EOF;
|
|
+ }
|
|
}
|
|
rc = lsx_skipbytes(ft, (size_t) 1); /* skip pad byte */
|
|
if (rc)
|