diff options
author | Tanu Kaskinen <tanuk@iki.fi> | 2018-03-20 10:50:24 +0200 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2018-03-25 09:40:42 +0100 |
commit | 21c85626a5fd5dd7ab4968054de0eaf32c20158b (patch) | |
tree | 08ffd986743ebc4c859dfe0cc797ed88e8a411e5 /meta/recipes-multimedia | |
parent | 399200d3a37dda6ad445612ea51ba52134f22561 (diff) | |
download | poky-21c85626a5fd5dd7ab4968054de0eaf32c20158b.tar.gz |
libvorbis: CVE-2018-5146
Prevent out-of-bounds write in codebook decoding. The bug could allow
code execution from a specially crafted Ogg Vorbis file.
References:
https://www.debian.org/security/2018/dsa-4140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5146
(From OE-Core rev: 1f01ce76c76d63f5ffe96baf518e670ae01c4d12)
Signed-off-by: Tanu Kaskinen <tanuk@iki.fi>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-multimedia')
-rw-r--r-- | meta/recipes-multimedia/libvorbis/libvorbis/CVE-2018-5146.patch | 100 | ||||
-rw-r--r-- | meta/recipes-multimedia/libvorbis/libvorbis_1.3.5.bb | 1 |
2 files changed, 101 insertions, 0 deletions
diff --git a/meta/recipes-multimedia/libvorbis/libvorbis/CVE-2018-5146.patch b/meta/recipes-multimedia/libvorbis/libvorbis/CVE-2018-5146.patch new file mode 100644 index 0000000000..6d4052a872 --- /dev/null +++ b/meta/recipes-multimedia/libvorbis/libvorbis/CVE-2018-5146.patch | |||
@@ -0,0 +1,100 @@ | |||
1 | From 3a017f591457bf6e80231b563bf83ee583fdbca8 Mon Sep 17 00:00:00 2001 | ||
2 | From: Thomas Daede <daede003@umn.edu> | ||
3 | Date: Thu, 15 Mar 2018 14:15:31 -0700 | ||
4 | Subject: [PATCH] CVE-2018-5146: Prevent out-of-bounds write in codebook | ||
5 | decoding. | ||
6 | |||
7 | Codebooks that are not an exact divisor of the partition size are now | ||
8 | truncated to fit within the partition. | ||
9 | |||
10 | Upstream-Status: Backport | ||
11 | CVE: CVE-2018-5146 | ||
12 | |||
13 | Reference to upstream patch: | ||
14 | https://git.xiph.org/?p=vorbis.git;a=commitdiff;h=667ceb4aab60c1f74060143bb24e5f427b3cce5f | ||
15 | |||
16 | Signed-off-by: Tanu Kaskinen <tanuk@iki.fi> | ||
17 | --- | ||
18 | lib/codebook.c | 48 ++++++++++-------------------------------------- | ||
19 | 1 file changed, 10 insertions(+), 38 deletions(-) | ||
20 | |||
21 | diff --git a/lib/codebook.c b/lib/codebook.c | ||
22 | index 8b766e8..7022fd2 100644 | ||
23 | --- a/lib/codebook.c | ||
24 | +++ b/lib/codebook.c | ||
25 | @@ -387,7 +387,7 @@ long vorbis_book_decodevs_add(codebook *book,float *a,oggpack_buffer *b,int n){ | ||
26 | t[i] = book->valuelist+entry[i]*book->dim; | ||
27 | } | ||
28 | for(i=0,o=0;i<book->dim;i++,o+=step) | ||
29 | - for (j=0;j<step;j++) | ||
30 | + for (j=0;o+j<n && j<step;j++) | ||
31 | a[o+j]+=t[j][i]; | ||
32 | } | ||
33 | return(0); | ||
34 | @@ -399,41 +399,12 @@ long vorbis_book_decodev_add(codebook *book,float *a,oggpack_buffer *b,int n){ | ||
35 | int i,j,entry; | ||
36 | float *t; | ||
37 | |||
38 | - if(book->dim>8){ | ||
39 | - for(i=0;i<n;){ | ||
40 | - entry = decode_packed_entry_number(book,b); | ||
41 | - if(entry==-1)return(-1); | ||
42 | - t = book->valuelist+entry*book->dim; | ||
43 | - for (j=0;j<book->dim;) | ||
44 | - a[i++]+=t[j++]; | ||
45 | - } | ||
46 | - }else{ | ||
47 | - for(i=0;i<n;){ | ||
48 | - entry = decode_packed_entry_number(book,b); | ||
49 | - if(entry==-1)return(-1); | ||
50 | - t = book->valuelist+entry*book->dim; | ||
51 | - j=0; | ||
52 | - switch((int)book->dim){ | ||
53 | - case 8: | ||
54 | - a[i++]+=t[j++]; | ||
55 | - case 7: | ||
56 | - a[i++]+=t[j++]; | ||
57 | - case 6: | ||
58 | - a[i++]+=t[j++]; | ||
59 | - case 5: | ||
60 | - a[i++]+=t[j++]; | ||
61 | - case 4: | ||
62 | - a[i++]+=t[j++]; | ||
63 | - case 3: | ||
64 | - a[i++]+=t[j++]; | ||
65 | - case 2: | ||
66 | - a[i++]+=t[j++]; | ||
67 | - case 1: | ||
68 | - a[i++]+=t[j++]; | ||
69 | - case 0: | ||
70 | - break; | ||
71 | - } | ||
72 | - } | ||
73 | + for(i=0;i<n;){ | ||
74 | + entry = decode_packed_entry_number(book,b); | ||
75 | + if(entry==-1)return(-1); | ||
76 | + t = book->valuelist+entry*book->dim; | ||
77 | + for(j=0;i<n && j<book->dim;) | ||
78 | + a[i++]+=t[j++]; | ||
79 | } | ||
80 | } | ||
81 | return(0); | ||
82 | @@ -471,12 +442,13 @@ long vorbis_book_decodevv_add(codebook *book,float **a,long offset,int ch, | ||
83 | long i,j,entry; | ||
84 | int chptr=0; | ||
85 | if(book->used_entries>0){ | ||
86 | - for(i=offset/ch;i<(offset+n)/ch;){ | ||
87 | + int m=(offset+n)/ch; | ||
88 | + for(i=offset/ch;i<m;){ | ||
89 | entry = decode_packed_entry_number(book,b); | ||
90 | if(entry==-1)return(-1); | ||
91 | { | ||
92 | const float *t = book->valuelist+entry*book->dim; | ||
93 | - for (j=0;j<book->dim;j++){ | ||
94 | + for (j=0;i<m && j<book->dim;j++){ | ||
95 | a[chptr++][i]+=t[j]; | ||
96 | if(chptr==ch){ | ||
97 | chptr=0; | ||
98 | -- | ||
99 | 2.16.2 | ||
100 | |||
diff --git a/meta/recipes-multimedia/libvorbis/libvorbis_1.3.5.bb b/meta/recipes-multimedia/libvorbis/libvorbis_1.3.5.bb index 32e92f009a..20f887c252 100644 --- a/meta/recipes-multimedia/libvorbis/libvorbis_1.3.5.bb +++ b/meta/recipes-multimedia/libvorbis/libvorbis_1.3.5.bb | |||
@@ -14,6 +14,7 @@ SRC_URI = "http://downloads.xiph.org/releases/vorbis/${BP}.tar.xz \ | |||
14 | file://0001-configure-Check-for-clang.patch \ | 14 | file://0001-configure-Check-for-clang.patch \ |
15 | file://CVE-2017-14633.patch \ | 15 | file://CVE-2017-14633.patch \ |
16 | file://CVE-2017-14632.patch \ | 16 | file://CVE-2017-14632.patch \ |
17 | file://CVE-2018-5146.patch \ | ||
17 | " | 18 | " |
18 | SRC_URI[md5sum] = "28cb28097c07a735d6af56e598e1c90f" | 19 | SRC_URI[md5sum] = "28cb28097c07a735d6af56e598e1c90f" |
19 | SRC_URI[sha256sum] = "54f94a9527ff0a88477be0a71c0bab09a4c3febe0ed878b24824906cd4b0e1d1" | 20 | SRC_URI[sha256sum] = "54f94a9527ff0a88477be0a71c0bab09a4c3febe0ed878b24824906cd4b0e1d1" |