diff options
author | Jagadeesh Krishnanjanappa <jkrishnanjanappa@mvista.com> | 2018-08-22 18:49:58 +0530 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2018-08-29 15:23:51 +0100 |
commit | c035a200286256d4e9dac378279a0f7fa6d3e279 (patch) | |
tree | 410f84e4330b388e9963a091bc3e82e0969b696c /meta | |
parent | 3c38e696391284f07915f503ef9ee7f8569d224a (diff) | |
download | poky-c035a200286256d4e9dac378279a0f7fa6d3e279.tar.gz |
libsndfile1: CVE-2017-14634
double64_init: Check psf->sf.channels against upper bound
This prevents division by zero later in the code.
While the trivial case to catch this (i.e. sf.channels < 1) has already
been covered, a crafted file may report a number of channels that is
so high (i.e. > INT_MAX/sizeof(double)) that it "somehow" gets
miscalculated to zero (if this makes sense) in the determination of the
blockwidth. Since we only support a limited number of channels anyway,
make sure to check here as well.
CVE-2017-14634
Closes: #318
Affects libsndfile1 = 1.0.28
(From OE-Core rev: 00da7bad24cf78c9dba091b9e480515f25886b48)
Signed-off-by: Jagadeesh Krishnanjanappa <jkrishnanjanappa@mvista.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta')
-rw-r--r-- | meta/recipes-multimedia/libsndfile/libsndfile1/CVE-2017-14634.patch | 42 | ||||
-rw-r--r-- | meta/recipes-multimedia/libsndfile/libsndfile1_1.0.28.bb | 1 |
2 files changed, 43 insertions, 0 deletions
diff --git a/meta/recipes-multimedia/libsndfile/libsndfile1/CVE-2017-14634.patch b/meta/recipes-multimedia/libsndfile/libsndfile1/CVE-2017-14634.patch new file mode 100644 index 0000000000..39b4ec1101 --- /dev/null +++ b/meta/recipes-multimedia/libsndfile/libsndfile1/CVE-2017-14634.patch | |||
@@ -0,0 +1,42 @@ | |||
1 | From 85c877d5072866aadbe8ed0c3e0590fbb5e16788 Mon Sep 17 00:00:00 2001 | ||
2 | From: Fabian Greffrath <fabian@greffrath.com> | ||
3 | Date: Thu, 28 Sep 2017 12:15:04 +0200 | ||
4 | Subject: [PATCH] double64_init: Check psf->sf.channels against upper bound | ||
5 | |||
6 | This prevents division by zero later in the code. | ||
7 | |||
8 | While the trivial case to catch this (i.e. sf.channels < 1) has already | ||
9 | been covered, a crafted file may report a number of channels that is | ||
10 | so high (i.e. > INT_MAX/sizeof(double)) that it "somehow" gets | ||
11 | miscalculated to zero (if this makes sense) in the determination of the | ||
12 | blockwidth. Since we only support a limited number of channels anyway, | ||
13 | make sure to check here as well. | ||
14 | |||
15 | CVE: CVE-2017-14634 | ||
16 | |||
17 | Closes: https://github.com/erikd/libsndfile/issues/318 | ||
18 | |||
19 | Upstream-Status: Backport [https://github.com/erikd/libsndfile/commit/85c877d5072866aadbe8ed0c3e0590fbb5e16788] | ||
20 | |||
21 | Signed-off-by: Erik de Castro Lopo <erikd@mega-nerd.com> | ||
22 | Signed-off-by: Jagadeesh Krishnanjanappa <jkrishnanjanappa@mvista.com> | ||
23 | --- | ||
24 | src/double64.c | 2 +- | ||
25 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
26 | |||
27 | diff --git a/src/double64.c b/src/double64.c | ||
28 | index b318ea8..78dfef7 100644 | ||
29 | --- a/src/double64.c | ||
30 | +++ b/src/double64.c | ||
31 | @@ -91,7 +91,7 @@ int | ||
32 | double64_init (SF_PRIVATE *psf) | ||
33 | { static int double64_caps ; | ||
34 | |||
35 | - if (psf->sf.channels < 1) | ||
36 | + if (psf->sf.channels < 1 || psf->sf.channels > SF_MAX_CHANNELS) | ||
37 | { psf_log_printf (psf, "double64_init : internal error : channels = %d\n", psf->sf.channels) ; | ||
38 | return SFE_INTERNAL ; | ||
39 | } ; | ||
40 | -- | ||
41 | 2.13.3 | ||
42 | |||
diff --git a/meta/recipes-multimedia/libsndfile/libsndfile1_1.0.28.bb b/meta/recipes-multimedia/libsndfile/libsndfile1_1.0.28.bb index c6f2a460b2..ed43b7494e 100644 --- a/meta/recipes-multimedia/libsndfile/libsndfile1_1.0.28.bb +++ b/meta/recipes-multimedia/libsndfile/libsndfile1_1.0.28.bb | |||
@@ -11,6 +11,7 @@ SRC_URI = "http://www.mega-nerd.com/libsndfile/files/libsndfile-${PV}.tar.gz \ | |||
11 | file://CVE-2017-8362.patch \ | 11 | file://CVE-2017-8362.patch \ |
12 | file://CVE-2017-8363.patch \ | 12 | file://CVE-2017-8363.patch \ |
13 | file://CVE-2017-14245-14246.patch \ | 13 | file://CVE-2017-14245-14246.patch \ |
14 | file://CVE-2017-14634.patch \ | ||
14 | " | 15 | " |
15 | 16 | ||
16 | SRC_URI[md5sum] = "646b5f98ce89ac60cdb060fcd398247c" | 17 | SRC_URI[md5sum] = "646b5f98ce89ac60cdb060fcd398247c" |