package/libsndfile: add upstream post-1.0.28 security fixes
authorPeter Korsgaard <peter@korsgaard.com>
Fri, 18 Jan 2019 08:55:18 +0000 (09:55 +0100)
committerPeter Korsgaard <peter@korsgaard.com>
Sat, 19 Jan 2019 15:33:14 +0000 (16:33 +0100)
commit45014da2b780e303433e9a7099fa3ef25b248bad
tree8fa35be57f55479bb6015ef16f30645700ad67a0
parent7defb333a48dc69817d63607fdab8481a515da09
package/libsndfile: add upstream post-1.0.28 security fixes

Fixes the following security vulnerabilities:

CVE-2017-14634: In libsndfile 1.0.28, a divide-by-zero error exists in the
function double64_init() in double64.c, which may lead to DoS when playing a
crafted audio file

CVE-2017-17456: The function d2alaw_array() in alaw.c of libsndfile
1.0.29pre1 may lead to a remote DoS attack (SEGV on unknown address
0x000000000000), a different vulnerability than CVE-2017-14245

CVE-2017-17457: The function d2ulaw_array() in ulaw.c of libsndfile
1.0.29pre1 may lead to a remote DoS attack (SEGV on unknown address
0x000000000000), a different vulnerability than CVE-2017-14246

CVE-2018-13139: A stack-based buffer overflow in psf_memset in common.c in
libsndfile 1.0.28 allows remote attackers to cause a denial of service
(application crash) or possibly have unspecified other impact via a crafted
audio file.  The vulnerability can be triggered by the executable
sndfile-deinterleave

CVE-2018-19661: An issue was discovered in libsndfile 1.0.28.  There is a
buffer over-read in the function i2ulaw_array in ulaw.c that will lead to a
denial of service

CVE-2018-19662: An issue was discovered in libsndfile 1.0.28.  There is a
buffer over-read in the function i2alaw_array in alaw.c that will lead to a
denial of service

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
package/libsndfile/0001-double64_init-Check-psf-sf.channels-against-upper-bo.patch [new file with mode: 0644]
package/libsndfile/0002-Check-MAX_CHANNELS-in-sndfile-deinterleave.patch [new file with mode: 0644]
package/libsndfile/0003-a-ulaw-fix-multiple-buffer-overflows-432.patch [new file with mode: 0644]