Date: Thu, 23 Jul 2015 00:40:53 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 201778] audio/sox: Multiple memory corruption vulnerabilities in SoX 14.4.2 Message-ID: <bug-201778-13-UXaX9dAXIk@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-201778-13@https.bugs.freebsd.org/bugzilla/> References: <bug-201778-13@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=201778 Jason Unovitch <jason.unovitch@gmail.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |ports-secteam@FreeBSD.org Attachment #159101| |maintainer-approval?(ports- Flags| |secteam@FreeBSD.org) --- Comment #1 from Jason Unovitch <jason.unovitch@gmail.com> --- Created attachment 159101 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=159101&action=edit security/vuxml for audio/sox Log: Document buffer overflow vulnerabilities speciality crafted WAV and VOC files PR: 201778 CVE: CVE-2014-8145 Security: 9dd761ff-30cb-11e5-a4a5-002590263bf5 Security: 92cda470-30cb-11e5-a4a5-002590263bf5 Details: Details on the most recent vulnerability seem scare at the moment. Document the issue as of now and start tracking it in a PR. The VuXML also documents CVE-2014-8145 which was publicly announced on 20 Dec 2014. This was fixed in 14.4.2. It is indeed fixed in 14.4.2 as I cross-checked 14.4.2 with the Debian patches along with noting that it's mentioned in the SoX changelog: o Detect MS ADPCM WAV files with invalid blocks. (cbagwell) o Detect Sphere files with invalid header sizes. (cbagwell) Validation: > make validate /bin/sh /usr/ports/security/vuxml/files/tidy.sh "/usr/ports/security/vuxml/files/tidy.xsl" "/usr/ports/security/vuxml/vuln.xml" > "/usr/ports/security/vuxml/vuln.xml.tidy" >>> Validating... /usr/local/bin/xmllint --valid --noout /usr/ports/security/vuxml/vuln.xml >>> Successful. Checking if tidy differs... ... seems okay Checking for space/tab... ... seems okay /usr/local/bin/python2.7 /usr/ports/security/vuxml/files/extra-validation.py /usr/ports/security/vuxml/vuln.xml > env PKG_DBDIR=/usr/ports/security/vuxml pkg audit sox-14.4.1 sox-14.4.1 is vulnerable: sox -- input sanitization errors CVE: CVE-2014-8145 WWW: https://vuxml.FreeBSD.org/freebsd/92cda470-30cb-11e5-a4a5-002590263bf5.html sox-14.4.1 is vulnerable: sox -- memory corruption vulnerabilities WWW: https://vuxml.FreeBSD.org/freebsd/9dd761ff-30cb-11e5-a4a5-002590263bf5.html 1 problem(s) in the installed packages found. > env PKG_DBDIR=/usr/ports/security/vuxml pkg audit sox-14.4.2 sox-14.4.2 is vulnerable: sox -- memory corruption vulnerabilities WWW: https://vuxml.FreeBSD.org/freebsd/9dd761ff-30cb-11e5-a4a5-002590263bf5.html 1 problem(s) in the installed packages found. -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-201778-13-UXaX9dAXIk>