Mailinglist Archive: opensuse-updates (111 mails)

< Previous Next >
openSUSE-SU-2018:0493-1: moderate: Security update for sox
openSUSE Security Update: Security update for sox
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:0493-1
Rating: moderate
References: #1063439 #1063450 #1063456 #1064576 #1081140
#1081141 #1081142 #1081146
Cross-References: CVE-2017-11332 CVE-2017-11358 CVE-2017-11359
CVE-2017-15370 CVE-2017-15371 CVE-2017-15372
CVE-2017-15642 CVE-2017-18189
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes 8 vulnerabilities is now available.

Description:

This update for sox fixes the following issues:

* CVE-2017-11332: Fixed the startread function in wav.c, which allowed
remote attackers to cause a DoS (divide-by-zero) via a crafted wav file.
(boo#1081140)
* CVE-2017-11358: Fixed the read_samples function in hcom.c, which allowed
remote attackers to cause a DoS (invalid memory read) via a crafted hcom
file. (boo#1081141)
* CVE-2017-11359: Fixed the wavwritehdr function in wav.c, which allowed
remote attackers to cause a DoS (divide-by-zero) when converting a a
crafted snd file to a wav file. (boo#1081142)
* CVE-2017-15370: Fixed a heap-based buffer overflow in the ImaExpandS
function of ima_rw.c, which allowed remote attackers to cause a DoS
during conversion of a crafted audio file. (boo#1063439)
* CVE-2017-15371: Fixed an assertion abort in the function
sox_append_comment() in formats.c, which allowed remote attackers to
cause a DoS during conversion of a crafted audio file. (boo#1063450)
* CVE-2017-15372: Fixed a stack-based buffer overflow in the
lsx_ms_adpcm_block_expand_i function of adpcm.c, which allowed remote
attackers to cause a DoS during conversion of a crafted audio file.
(boo#1063456)
* CVE-2017-15642: Fixed an Use-After-Free vulnerability in
lsx_aiffstartread in aiff.c, which could be triggered by an attacker by
providing a malformed AIFF file. (boo#1064576)
* CVE-2017-18189: Fixed a NULL pointer dereference triggered by a corrupt
header specifying zero channels in the startread function in xa.c, which
allowed remote attackers to cause a DoS (boo#1081146).


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-185=1

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE Leap 42.3 (i586 x86_64):

libsox3-14.4.2-5.3.1
libsox3-debuginfo-14.4.2-5.3.1
sox-14.4.2-5.3.1
sox-debuginfo-14.4.2-5.3.1
sox-debugsource-14.4.2-5.3.1
sox-devel-14.4.2-5.3.1


References:

https://www.suse.com/security/cve/CVE-2017-11332.html
https://www.suse.com/security/cve/CVE-2017-11358.html
https://www.suse.com/security/cve/CVE-2017-11359.html
https://www.suse.com/security/cve/CVE-2017-15370.html
https://www.suse.com/security/cve/CVE-2017-15371.html
https://www.suse.com/security/cve/CVE-2017-15372.html
https://www.suse.com/security/cve/CVE-2017-15642.html
https://www.suse.com/security/cve/CVE-2017-18189.html
https://bugzilla.suse.com/1063439
https://bugzilla.suse.com/1063450
https://bugzilla.suse.com/1063456
https://bugzilla.suse.com/1064576
https://bugzilla.suse.com/1081140
https://bugzilla.suse.com/1081141
https://bugzilla.suse.com/1081142
https://bugzilla.suse.com/1081146


< Previous Next >
This Thread
  • No further messages