File _patchinfo of Package patchinfo.7808

<patchinfo incident="7808">
  <issue id="1081146" tracker="bnc">VUL-1: CVE-2017-18189: sox: In the startread function in xa.c in a corrupt header specifying zero channels triggers an infinite loop with a resultant NULL pointer dereference, which may allow a remote attacker to cause a DoS</issue>
  <issue id="1081140" tracker="bnc">VUL-1: CVE-2017-11332: sox: The startread function in wav.c in allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted wav file.</issue>
  <issue id="1081141" tracker="bnc">VUL-1: CVE-2017-11358: sox: The read_samples function in hcom.c allows remote attackers to cause a denial of service (invalid memory read and application crash) via a crafted hcom file.</issue>
  <issue id="1081142" tracker="bnc">VUL-1: CVE-2017-11359: sox: The wavwritehdr function in wav.c allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted snd file, during conversion to a wav file.</issue>
  <issue id="1064576" tracker="bnc">VUL-0: CVE-2017-15642: sox: Use-After-Free vulnerability in lsx_aiffstartread in aiff.c</issue>
  <issue id="1063450" tracker="bnc">VUL-0: CVE-2017-15371: sox: reachable assertion abort in the function sox_append_comment() in formats.c</issue>
  <issue id="1063456" tracker="bnc">VUL-0: CVE-2017-15372: sox: stack-overflow vulnerability in lsx_ms_adpcm_block_expand_i in adpcm.c</issue>
  <issue id="1063439" tracker="bnc">VUL-0: CVE-2017-15370: sox: heap-buffer-overflow in ImaExpandS in ima_rw.c</issue>
  <issue id="2017-15642" tracker="cve" />
  <issue id="2017-11359" tracker="cve" />
  <issue id="2017-11358" tracker="cve" />
  <issue id="2017-11332" tracker="cve" />
  <issue id="2017-15371" tracker="cve" />
  <issue id="2017-15370" tracker="cve" />
  <issue id="2017-18189" tracker="cve" />
  <issue id="2017-15372" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>kbabioch</packager>
  <description>This update for sox fixes the following issues:

* CVE-2017-11332: Fixed the startread function in wav.c, which allowed
  remote attackers to cause a DoS (divide-by-zero) via a crafted wav file.
  (boo#1081140)
* CVE-2017-11358: Fixed the read_samples function in hcom.c, which
  allowed remote attackers to cause a DoS (invalid memory read) via a crafted
  hcom file. (boo#1081141)
* CVE-2017-11359: Fixed the wavwritehdr function in wav.c, which
  allowed remote attackers to cause a DoS (divide-by-zero) when converting a
  a crafted snd file to a wav file. (boo#1081142)
* CVE-2017-15370: Fixed a heap-based buffer overflow in the ImaExpandS
  function of ima_rw.c, which allowed remote attackers to cause a DoS during
  conversion of a crafted audio file. (boo#1063439)
* CVE-2017-15371: Fixed an assertion abort in the function
  sox_append_comment() in formats.c, which allowed remote attackers to cause
  a DoS during conversion of a crafted audio file. (boo#1063450)
* CVE-2017-15372: Fixed a stack-based buffer overflow in the
  lsx_ms_adpcm_block_expand_i function of adpcm.c, which allowed remote
  attackers to cause a DoS during conversion of a crafted audio file.
  (boo#1063456)
* CVE-2017-15642: Fixed an Use-After-Free vulnerability in
  lsx_aiffstartread in aiff.c, which could be triggered by an attacker by
  providing a malformed AIFF file. (boo#1064576)
* CVE-2017-18189: Fixed a NULL pointer dereference triggered by a
  corrupt header specifying zero channels in the startread function in
  xa.c, which allowed remote attackers to cause a DoS (boo#1081146).

</description>
  <summary>Security update for sox</summary>
</patchinfo>
openSUSE Build Service is sponsored by