svn commit: r463360 - head/security/vuxml
Jason E. Hale
jhale at FreeBSD.org
Thu Mar 1 23:52:58 UTC 2018
Author: jhale
Date: Thu Mar 1 23:52:56 2018
New Revision: 463360
URL: https://svnweb.freebsd.org/changeset/ports/463360
Log:
Document additional vulnerabilities in audio/libsndfile
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Thu Mar 1 23:46:17 2018 (r463359)
+++ head/security/vuxml/vuln.xml Thu Mar 1 23:52:56 2018 (r463360)
@@ -58,6 +58,135 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="30704aba-1da4-11e8-b6aa-4ccc6adda413">
+ <topic>libsndfile -- out-of-bounds reads</topic>
+ <affects>
+ <package>
+ <name>libsndfile</name>
+ <name>linux-c6-libsndfile</name>
+ <name>linux-c7-libsndfile</name>
+ <range><lt>1.0.29</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Xin-Jiang on Github reports:</p>
+ <blockquote cite="https://github.com/erikd/libsndfile/issues/317">
+ <p>CVE-2017-14245 (Medium): An out of bounds read in the function
+ d2alaw_array() in alaw.c of libsndfile 1.0.28 may lead to a remote
+ DoS attack or information disclosure, related to mishandling of
+ the NAN and INFINITY floating-point values.</p>
+ <p>CVE-2017-14246 (Medium): An out of bounds read in the function
+ d2ulaw_array() in ulaw.c of libsndfile 1.0.28 may lead to a remote
+ DoS attack or information disclosure, related to mishandling of the
+ NAN and INFINITY floating-point values.</p>
+ </blockquote>
+ <p>my123px on Github reports:</p>
+ <blockquote cite="https://github.com/erikd/libsndfile/issues/344">
+ <p>CVE-2017-17456 (Medium): The function d2alaw_array() in alaw.c of
+ libsndfile 1.0.29pre1 may lead to a remote DoS attack (SEGV on unknown
+ address 0x000000000000), a different vulnerability than CVE-2017-14245.</p>
+ <p>CVE-2017-17457 (Medium): The function d2ulaw_array() in ulaw.c of
+ libsndfile 1.0.29pre1 may lead to a remote DoS attack (SEGV on unknown
+ address 0x000000000000), a different vulnerability than CVE-2017-14246.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2017-14245</cvename>
+ <cvename>CVE-2017-14246</cvename>
+ <url>https://github.com/erikd/libsndfile/issues/317</url>
+ <cvename>CVE-2017-17456</cvename>
+ <cvename>CVE-2017-17457</cvename>
+ <url>https://github.com/erikd/libsndfile/issues/344</url>
+ </references>
+ <dates>
+ <discovery>2017-09-11</discovery>
+ <entry>2018-03-01</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="2b386075-1d9c-11e8-b6aa-4ccc6adda413">
+ <topic>libsndfile -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>libsndfile</name>
+ <name>linux-c6-libsndfile</name>
+ <name>linux-c7-libsndfile</name>
+ <range><le>1.0.28</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Agostino Sarubbo, Gentoo reports:</p>
+ <blockquote cite="https://blogs.gentoo.org/ago/2017/04/29/libsndfile-global-buffer-overflow-in-flac_buffer_copy-flac-c/">
+ <p>CVE-2017-8361 (Medium): The flac_buffer_copy function in flac.c in
+ libsndfile 1.0.28 allows remote attackers to cause a denial of service
+ (buffer overflow and application crash) or possibly have unspecified
+ other impact via a crafted audio file.</p>
+ </blockquote>
+ <blockquote cite="https://blogs.gentoo.org/ago/2017/04/29/libsndfile-invalid-memory-read-in-flac_buffer_copy-flac-c/">
+ <p>CVE-2017-8362 (Medium): The flac_buffer_copy function in flac.c in
+ libsndfile 1.0.28 allows remote attackers to cause a denial of service
+ (invalid read and application crash) via a crafted audio file.</p>
+ </blockquote>
+ <blockquote cite="https://blogs.gentoo.org/ago/2017/04/29/libsndfile-heap-based-buffer-overflow-in-flac_buffer_copy-flac-c/">
+ <p>CVE-2017-8363 (Medium): The flac_buffer_copy function in flac.c in
+ libsndfile 1.0.28 allows remote attackers to cause a denial of service
+ (heap-based buffer over-read and application crash) via a crafted audio
+ file.</p>
+ </blockquote>
+ <blockquote cite="https://blogs.gentoo.org/ago/2017/04/29/libsndfile-global-buffer-overflow-in-i2les_array-pcm-c/">
+ <p>CVE-2017-8365 (Medium): The i2les_array function in pcm.c in libsndfile
+ 1.0.28 allows remote attackers to cause a denial of service (buffer
+ over-read and application crash) via a crafted audio file.</p>
+ </blockquote>
+ <p>manxorist on Github reports:</p>
+ <blockquote cite="https://github.com/erikd/libsndfile/issues/292">
+ <p>CVE-2017-12562 (High): Heap-based Buffer Overflow in the
+ psf_binheader_writef function in common.c in libsndfile through
+ 1.0.28 allows remote attackers to cause a denial of service
+ (application crash) or possibly have unspecified other impact.</p>
+ </blockquote>
+ <p>Xin-Jiang on Github reports:</p>
+ <blockquote cite="https://github.com/erikd/libsndfile/issues/318">
+ <p>CVE-2017-14634 (Medium): In libsndfile 1.0.28, a divide-by-zero
+ error exists in the function double64_init() in double64.c, which
+ may lead to DoS when playing a crafted audio file.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2017-8361</cvename>
+ <url>https://blogs.gentoo.org/ago/2017/04/29/libsndfile-global-buffer-overflow-in-flac_buffer_copy-flac-c/</url>
+ <url>https://github.com/erikd/libsndfile/issues/232</url>
+ <url>https://github.com/erikd/libsndfile/commit/fd0484aba8e51d16af1e3a880f9b8b857b385eb3</url>
+ <cvename>CVE-2017-8362</cvename>
+ <url>https://blogs.gentoo.org/ago/2017/04/29/libsndfile-invalid-memory-read-in-flac_buffer_copy-flac-c/</url>
+ <url>https://github.com/erikd/libsndfile/issues/231</url>
+ <url>https://github.com/erikd/libsndfile/commit/ef1dbb2df1c0e741486646de40bd638a9c4cd808</url>
+ <cvename>CVE-2017-8363</cvename>
+ <url>https://blogs.gentoo.org/ago/2017/04/29/libsndfile-heap-based-buffer-overflow-in-flac_buffer_copy-flac-c/</url>
+ <url>https://github.com/erikd/libsndfile/issues/233</url>
+ <url>https://github.com/erikd/libsndfile/commit/fd0484aba8e51d16af1e3a880f9b8b857b385eb3</url>
+ <url>https://github.com/erikd/libsndfile/commit/cd7da8dbf6ee4310d21d9e44b385d6797160d9e8</url>
+ <cvename>CVE-2017-8365</cvename>
+ <url>https://blogs.gentoo.org/ago/2017/04/29/libsndfile-global-buffer-overflow-in-i2les_array-pcm-c/</url>
+ <url>https://github.com/erikd/libsndfile/issues/230</url>
+ <url>https://github.com/erikd/libsndfile/commit/fd0484aba8e51d16af1e3a880f9b8b857b385eb3</url>
+ <cvename>CVE-2017-12562</cvename>
+ <url>https://github.com/erikd/libsndfile/issues/292/</url>
+ <url>https://github.com/erikd/libsndfile/commit/cf7a8182c2642c50f1cf90dddea9ce96a8bad2e8</url>
+ <cvename>CVE-2017-14634</cvename>
+ <url>https://github.com/erikd/libsndfile/issues/318</url>
+ <url>https://github.com/erikd/libsndfile/commit/85c877d5072866aadbe8ed0c3e0590fbb5e16788</url>
+ </references>
+ <dates>
+ <discovery>2017-04-12</discovery>
+ <entry>2018-03-01</entry>
+ </dates>
+ </vuln>
+
<vuln vid="e3eeda2e-1d67-11e8-a2ec-6cc21735f730">
<topic>PostgreSQL vulnerabilities</topic>
<affects>
More information about the svn-ports-all
mailing list