Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 914450 (CVE-2022-33064, CVE-2022-33065)

Summary: media-libs/libsndfile: multiple vulnerabilities
Product: Gentoo Security Reporter: John Helmert III <ajak>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: CONFIRMED ---    
Severity: minor CC: fkobi, sound
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard: B3 [ebuild]
Package list:
Runtime testing required: ---

Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-09-20 03:38:20 UTC
CVE-2022-33065 (https://github.com/libsndfile/libsndfile/issues/833):
Closed as a dupe: https://github.com/libsndfile/libsndfile/issues/789

Multiple signed integers overflow in function au_read_header in src/au.c and in functions mat4_open and mat4_read_header in src/mat4.c in Libsndfile, allows an attacker to cause Denial of Service or other unspecified impacts.

CVE-2022-33064 (https://github.com/libsndfile/libsndfile/issues/832):

An off-by-one error in function wav_read_header in src/wav.c in Libsndfile 1.1.0, results in a write out of bound, which allows an attacker to execute arbitrary code, Denial of Service or other unspecified impacts.
Comment 1 Filip Kobierski 2025-03-12 00:10:06 UTC
What happens now?
Comment 2 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2025-03-12 00:11:51 UTC
(In reply to Filip Kobierski from comment #1)
> What happens now?

The upstream bug is still open, so...?
Comment 3 Filip Kobierski 2025-03-12 00:22:43 UTC
It seems to me CVE-2022-33065 has been patched in 1.2.0 (fixed nr 3).
https://github.com/libsndfile/libsndfile/releases/tag/1.2.0

For the other one I guess we just wait then :/