Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 533750 (CVE-2014-9496)

Summary: <media-libs/libsndfile-1.0.26: buffer overread (CVE-2014-9496)
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: normal CC: sound
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://www.openwall.com/lists/oss-security/2014/12/25/2
Whiteboard: B2 [glsa cve]
Package list:
Runtime testing required: ---
Bug Depends on: 566680    
Bug Blocks:    

Description Agostino Sarubbo gentoo-dev 2014-12-28 09:33:04 UTC
From ${URL} :

A buffer overread was found in libsndfile by me, in the latest version.
Fix commit here:
https://github.com/erikd/libsndfile/commit/dbe14f00030af5d3577f4cabbf9861db59e9c378



@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2015-06-17 17:40:29 UTC
CVE-2014-9496 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9496):
  The sd2_parse_rsrc_fork function in sd2.c in libsndfile allows attackers to
  have unspecified impact via vectors related to a (1) map offset or (2) rsrc
  marker, which triggers an out-of-bounds read.
Comment 2 Justin Lecher (RETIRED) gentoo-dev 2016-01-26 08:54:31 UTC
commit 6f4d6d4e5f9402581ccb90dcba045a509b03a99a
Author: Justin Lecher <jlec@gentoo.org>
Date:   Tue Jan 26 09:51:14 2016 +0100

    media-libs/libsndfile: Drop version vulnerable for CVE-2015-7805

    Package-Manager: portage-2.2.27
    Signed-off-by: Justin Lecher <jlec@gentoo.org>

    https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=6f4d6d4e5f9402581ccb90dcba045a509b03a99a
Comment 3 Justin Lecher (RETIRED) gentoo-dev 2016-01-26 08:54:52 UTC
@sec, clean again
Comment 4 Thomas Deutschmann (RETIRED) gentoo-dev 2016-11-21 20:27:17 UTC
@ Security: Waiting for GLSA...
Comment 5 GLSAMaker/CVETool Bot gentoo-dev 2016-12-03 10:28:41 UTC
This issue was resolved and addressed in
 GLSA 201612-03 at https://security.gentoo.org/glsa/201612-03
by GLSA coordinator Aaron Bauman (b-man).