openSUSE Security Update: Security update for sox ______________________________________________________________________________ Announcement ID: openSUSE-SU-2018:0493-1 Rating: moderate References: #1063439 #1063450 #1063456 #1064576 #1081140 #1081141 #1081142 #1081146 Cross-References: CVE-2017-11332 CVE-2017-11358 CVE-2017-11359 CVE-2017-15370 CVE-2017-15371 CVE-2017-15372 CVE-2017-15642 CVE-2017-18189 Affected Products: openSUSE Leap 42.3 ______________________________________________________________________________ An update that fixes 8 vulnerabilities is now available. Description: This update for sox fixes the following issues: * CVE-2017-11332: Fixed the startread function in wav.c, which allowed remote attackers to cause a DoS (divide-by-zero) via a crafted wav file. (boo#1081140) * CVE-2017-11358: Fixed the read_samples function in hcom.c, which allowed remote attackers to cause a DoS (invalid memory read) via a crafted hcom file. (boo#1081141) * CVE-2017-11359: Fixed the wavwritehdr function in wav.c, which allowed remote attackers to cause a DoS (divide-by-zero) when converting a a crafted snd file to a wav file. (boo#1081142) * CVE-2017-15370: Fixed a heap-based buffer overflow in the ImaExpandS function of ima_rw.c, which allowed remote attackers to cause a DoS during conversion of a crafted audio file. (boo#1063439) * CVE-2017-15371: Fixed an assertion abort in the function sox_append_comment() in formats.c, which allowed remote attackers to cause a DoS during conversion of a crafted audio file. (boo#1063450) * CVE-2017-15372: Fixed a stack-based buffer overflow in the lsx_ms_adpcm_block_expand_i function of adpcm.c, which allowed remote attackers to cause a DoS during conversion of a crafted audio file. (boo#1063456) * CVE-2017-15642: Fixed an Use-After-Free vulnerability in lsx_aiffstartread in aiff.c, which could be triggered by an attacker by providing a malformed AIFF file. (boo#1064576) * CVE-2017-18189: Fixed a NULL pointer dereference triggered by a corrupt header specifying zero channels in the startread function in xa.c, which allowed remote attackers to cause a DoS (boo#1081146). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.3: zypper in -t patch openSUSE-2018-185=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.3 (i586 x86_64): libsox3-14.4.2-5.3.1 libsox3-debuginfo-14.4.2-5.3.1 sox-14.4.2-5.3.1 sox-debuginfo-14.4.2-5.3.1 sox-debugsource-14.4.2-5.3.1 sox-devel-14.4.2-5.3.1 References: https://www.suse.com/security/cve/CVE-2017-11332.html https://www.suse.com/security/cve/CVE-2017-11358.html https://www.suse.com/security/cve/CVE-2017-11359.html https://www.suse.com/security/cve/CVE-2017-15370.html https://www.suse.com/security/cve/CVE-2017-15371.html https://www.suse.com/security/cve/CVE-2017-15372.html https://www.suse.com/security/cve/CVE-2017-15642.html https://www.suse.com/security/cve/CVE-2017-18189.html https://bugzilla.suse.com/1063439 https://bugzilla.suse.com/1063450 https://bugzilla.suse.com/1063456 https://bugzilla.suse.com/1064576 https://bugzilla.suse.com/1081140 https://bugzilla.suse.com/1081141 https://bugzilla.suse.com/1081142 https://bugzilla.suse.com/1081146