lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20090613150309.GA7567@ngolde.de>
Date: Sat, 13 Jun 2009 17:03:09 +0200
From: Nico Golde <nion@...ian.org>
To: debian-security-announce@...ts.debian.org
Subject: [SECURITY] [DSA 1814-1] New libsndfile packages
	fix arbitrary code execution

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA-1814-1                    security@...ian.org
http://www.debian.org/security/                                 Nico Golde
June 13th, 2009                         http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : libsndfile
Vulnerability  : heap-based buffer overflow
Problem type   : local (remote)
Debian-specific: no
Debian bug     : 528650
CVE ID         : CVE-2009-1788 CVE-2009-1791


Two vulnerabilities have been found in libsndfile, a library to read
and write sampled audio data.  The Common Vulnerabilities and Exposures
project identified the following problems:

Tobias Klein discovered that the VOC parsing routines suffer of a heap-based
buffer overflow which can be triggered by an attacker via a crafted VOC
header (CVE-2009-1788).

The vendor discovered that the  AIFF parsing routines suffer of a heap-based
buffer overflow similar to CVE-2009-1788 which can be triggered by an attacker
via a crafted AIFF header (CVE-2009-1791).

In both cases the overflowing data is not completely attacker controlled but
still leads to application crashes or under some circumstances might still
lead to arbitrary code execution.


For the oldstable distribution (etch), this problem has been fixed in
version 1.0.16-2+etch2.

For the stable distribution (lenny), this problem has been fixed in
version 1.0.17-4+lenny2.

For the testing distribution (squeeze), this problem will be fixed soon.

For the unstable distribution (sid), this problem has been fixed in
version 1.0.20-1.


We recommend that you upgrade your libsndfile packages.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Debian (oldstable)
- ------------------

Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile_1.0.16-2+etch2.dsc
    Size/MD5 checksum:      659 fe69a3bbf260e7539ec189fe9d81889d
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile_1.0.16-2+etch2.diff.gz
    Size/MD5 checksum:     6453 8a43fb7713b8247bd1e5f1bf7a6e9923
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile_1.0.16.orig.tar.gz
    Size/MD5 checksum:   857117 773b6639672d39b6342030c7fd1e9719

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1-dev_1.0.16-2+etch2_alpha.deb
    Size/MD5 checksum:   400794 04c86699fad7bfa734f6db94e7814574
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1_1.0.16-2+etch2_alpha.deb
    Size/MD5 checksum:   222774 f6411ea0366b55e8cdcd308f51af7aaa
  http://security.debian.org/pool/updates/main/libs/libsndfile/sndfile-programs_1.0.16-2+etch2_alpha.deb
    Size/MD5 checksum:    72500 fb13ac77eec3b3cb791b0d05dc4abce1

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/libs/libsndfile/sndfile-programs_1.0.16-2+etch2_amd64.deb
    Size/MD5 checksum:    70818 efc9612d010aa0e9f260e4726f7fd809
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1_1.0.16-2+etch2_amd64.deb
    Size/MD5 checksum:   187554 1ad927a4dde060a045052031c6dee298
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1-dev_1.0.16-2+etch2_amd64.deb
    Size/MD5 checksum:   322608 0b5e2551db19f1e67d90fb402a3e4b55

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1_1.0.16-2+etch2_hppa.deb
    Size/MD5 checksum:   236528 9a134046572d39fef1a8344ecdca0a23
  http://security.debian.org/pool/updates/main/libs/libsndfile/sndfile-programs_1.0.16-2+etch2_hppa.deb
    Size/MD5 checksum:    75046 bd7b926daab6bef2036398a3ab07527c
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1-dev_1.0.16-2+etch2_hppa.deb
    Size/MD5 checksum:   375188 67a8110d0f4a87618af8e8d45ae24349

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1-dev_1.0.16-2+etch2_i386.deb
    Size/MD5 checksum:   320972 5d76ff009184ad5345a54e8d8194fffe
  http://security.debian.org/pool/updates/main/libs/libsndfile/sndfile-programs_1.0.16-2+etch2_i386.deb
    Size/MD5 checksum:    71000 7ebac264cb5b8ffa89f25d3ccc1a75cc
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1_1.0.16-2+etch2_i386.deb
    Size/MD5 checksum:   198076 260d7f6aa38f89f8977a3ad49e990b43

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/libs/libsndfile/sndfile-programs_1.0.16-2+etch2_ia64.deb
    Size/MD5 checksum:    76026 cbe650d86af4ecc63a69056fd75eca87
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1_1.0.16-2+etch2_ia64.deb
    Size/MD5 checksum:   270996 9cace4aabe93c43722c432b6c4e4442e
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1-dev_1.0.16-2+etch2_ia64.deb
    Size/MD5 checksum:   416638 df26e7f277e084280ffdc817ae53b7f3

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1_1.0.16-2+etch2_mips.deb
    Size/MD5 checksum:   217472 10109974f4c321580f791bf5e49124e7
  http://security.debian.org/pool/updates/main/libs/libsndfile/sndfile-programs_1.0.16-2+etch2_mips.deb
    Size/MD5 checksum:    73040 a9f2a80bc90165a3e92903f4edc444da
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1-dev_1.0.16-2+etch2_mips.deb
    Size/MD5 checksum:   374506 f6c67974732dd1de4bd3a9158f3c1c20

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/libs/libsndfile/sndfile-programs_1.0.16-2+etch2_mipsel.deb
    Size/MD5 checksum:    73062 a508b896c5de5ebd5dff792afff15c29
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1_1.0.16-2+etch2_mipsel.deb
    Size/MD5 checksum:   216994 96315e55d624bee6e44d015d37c710c1
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1-dev_1.0.16-2+etch2_mipsel.deb
    Size/MD5 checksum:   373658 65ed601088e7b02b509556d11dcd8d1d

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1-dev_1.0.16-2+etch2_powerpc.deb
    Size/MD5 checksum:   351902 a4123d15745b1eb1af28fdb78b63bd82
  http://security.debian.org/pool/updates/main/libs/libsndfile/sndfile-programs_1.0.16-2+etch2_powerpc.deb
    Size/MD5 checksum:    76584 0f5fae422385aa9d839be192aed31444
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1_1.0.16-2+etch2_powerpc.deb
    Size/MD5 checksum:   207620 557e216bb6625ee2352b161474f0d5c0

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1_1.0.16-2+etch2_s390.deb
    Size/MD5 checksum:   221198 664d13a054568b329e4d625a0b5038e0
  http://security.debian.org/pool/updates/main/libs/libsndfile/sndfile-programs_1.0.16-2+etch2_s390.deb
    Size/MD5 checksum:    73066 89616dead6b5d3a2847e2536b8cb072b
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1-dev_1.0.16-2+etch2_s390.deb
    Size/MD5 checksum:   346752 85718e326019f4eb3a45daf2e67b3c1a

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1-dev_1.0.16-2+etch2_sparc.deb
    Size/MD5 checksum:   339010 4d7c07314114134799a36c801ab1f49e
  http://security.debian.org/pool/updates/main/libs/libsndfile/sndfile-programs_1.0.16-2+etch2_sparc.deb
    Size/MD5 checksum:    70940 88eb23fe6f813ecd026131c863bf41f8
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1_1.0.16-2+etch2_sparc.deb
    Size/MD5 checksum:   208148 68df6e036a2a22376e3974f614115014


Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Debian (stable)
- ---------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile_1.0.17-4+lenny2.dsc
    Size/MD5 checksum:     1134 51d9eb65dd02a51f539d841417d49f1b
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile_1.0.17-4+lenny2.diff.gz
    Size/MD5 checksum:    10627 2325910ddaba0afbdd7e317e38970bb8
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile_1.0.17.orig.tar.gz
    Size/MD5 checksum:   819456 2d126c35448503f6dbe33934d9581f6b

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1_1.0.17-4+lenny2_alpha.deb
    Size/MD5 checksum:   226090 e2b9f5ad19011d18709d4cedaade37fa
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1-dev_1.0.17-4+lenny2_alpha.deb
    Size/MD5 checksum:   410994 8483cb52b025c5daf82e8bb8c79e975f
  http://security.debian.org/pool/updates/main/libs/libsndfile/sndfile-programs_1.0.17-4+lenny2_alpha.deb
    Size/MD5 checksum:    74138 f7ff92888db92ee16c39d31a34b458ba

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1_1.0.17-4+lenny2_amd64.deb
    Size/MD5 checksum:   191352 a7fcfefe56bbe623aedf4c1a716fbd7c
  http://security.debian.org/pool/updates/main/libs/libsndfile/sndfile-programs_1.0.17-4+lenny2_amd64.deb
    Size/MD5 checksum:    73166 95ae8a7f7cc414b590492a5ccb8b54bb
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1-dev_1.0.17-4+lenny2_amd64.deb
    Size/MD5 checksum:   333800 c082042884f8aa7d54456c7edda82505

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1_1.0.17-4+lenny2_arm.deb
    Size/MD5 checksum:   217242 b1d688c41ee46c865b28dec19d7138f1
  http://security.debian.org/pool/updates/main/libs/libsndfile/sndfile-programs_1.0.17-4+lenny2_arm.deb
    Size/MD5 checksum:    74296 2d60cc9b8e2a586ddf7f69a3550db4ac
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1-dev_1.0.17-4+lenny2_arm.deb
    Size/MD5 checksum:   349034 2cb39ad7ca3213b2e377445d4f05204f

armel architecture (ARM EABI)

  http://security.debian.org/pool/updates/main/libs/libsndfile/sndfile-programs_1.0.17-4+lenny2_armel.deb
    Size/MD5 checksum:    76490 091e276cadfdcf6d1d7f6981775a2a22
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1_1.0.17-4+lenny2_armel.deb
    Size/MD5 checksum:   220838 c303edbc05beebb5021928367c49cdc9
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1-dev_1.0.17-4+lenny2_armel.deb
    Size/MD5 checksum:   355852 d3382eaacdfb9f6c85b0ff68feade506

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1_1.0.17-4+lenny2_hppa.deb
    Size/MD5 checksum:   236520 23c8272b8abd38f01079b0b6026864cf
  http://security.debian.org/pool/updates/main/libs/libsndfile/sndfile-programs_1.0.17-4+lenny2_hppa.deb
    Size/MD5 checksum:    76920 d20fe4a5f04535145a1816db5a32df71
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1-dev_1.0.17-4+lenny2_hppa.deb
    Size/MD5 checksum:   379156 f0499c6fd090c1898de78c5976ca78b0

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/libs/libsndfile/sndfile-programs_1.0.17-4+lenny2_i386.deb
    Size/MD5 checksum:    72948 2b409333b2ddfc6abac2c5e8a3fa4c52
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1-dev_1.0.17-4+lenny2_i386.deb
    Size/MD5 checksum:   326262 a12481a50bc8e4d3ca8d42114a109261
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1_1.0.17-4+lenny2_i386.deb
    Size/MD5 checksum:   196632 929743d1597c465e4cf871698c8643a2

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1_1.0.17-4+lenny2_ia64.deb
    Size/MD5 checksum:   274624 793a250f573b51eb3c236cceb1a1bfd5
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1-dev_1.0.17-4+lenny2_ia64.deb
    Size/MD5 checksum:   430950 d9c31e7271ec506ed8fb427c1428064a
  http://security.debian.org/pool/updates/main/libs/libsndfile/sndfile-programs_1.0.17-4+lenny2_ia64.deb
    Size/MD5 checksum:    77798 984421618e44f369931120c39264ae45

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1_1.0.17-4+lenny2_mips.deb
    Size/MD5 checksum:   214948 a0e0e337d7902d1ef6a2a289c673f872
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1-dev_1.0.17-4+lenny2_mips.deb
    Size/MD5 checksum:   381394 099c34ac8b3251378b923078d8b1b863
  http://security.debian.org/pool/updates/main/libs/libsndfile/sndfile-programs_1.0.17-4+lenny2_mips.deb
    Size/MD5 checksum:    75114 51ff1f2c3b21029e6b3f023756ae7f69

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1-dev_1.0.17-4+lenny2_mipsel.deb
    Size/MD5 checksum:   379494 fc38dea8e6242b7b6562dff24a8fcdfd
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1_1.0.17-4+lenny2_mipsel.deb
    Size/MD5 checksum:   215384 ca2207de85164e39282dd1c47c8a4dc2
  http://security.debian.org/pool/updates/main/libs/libsndfile/sndfile-programs_1.0.17-4+lenny2_mipsel.deb
    Size/MD5 checksum:    74968 b305260d39f855ec6d5abc650072753e

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1-dev_1.0.17-4+lenny2_powerpc.deb
    Size/MD5 checksum:   362142 0a4bc9e2ca82e625114545bfa00ba442
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1_1.0.17-4+lenny2_powerpc.deb
    Size/MD5 checksum:   212946 2a579d5238131e888a8608f28c8c1b4c
  http://security.debian.org/pool/updates/main/libs/libsndfile/sndfile-programs_1.0.17-4+lenny2_powerpc.deb
    Size/MD5 checksum:    81158 9f00494a4f70a89e114c8f9c8e1f70e2

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1-dev_1.0.17-4+lenny2_s390.deb
    Size/MD5 checksum:   355712 f00055811535af5da4e6177e5641bb9a
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1_1.0.17-4+lenny2_s390.deb
    Size/MD5 checksum:   220080 f0fa6c86da09f962c5ee0ed8783164ac
  http://security.debian.org/pool/updates/main/libs/libsndfile/sndfile-programs_1.0.17-4+lenny2_s390.deb
    Size/MD5 checksum:    75230 a2a5d37ef8bb4129eaf0d33dabce9e57

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/libs/libsndfile/sndfile-programs_1.0.17-4+lenny2_sparc.deb
    Size/MD5 checksum:    73614 d3cd01e6c95f41efa016fa1e470cb300
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1-dev_1.0.17-4+lenny2_sparc.deb
    Size/MD5 checksum:   342854 adbc2be1b13fc19b709c5a300532d6c6
  http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile1_1.0.17-4+lenny2_sparc.deb
    Size/MD5 checksum:   206250 f2971a5a5d4ac6ffde7c61257745d95e


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkozv60ACgkQHYflSXNkfP/NhgCgkY9naVwXzps37xOEAEXPKh03
YbgAmwSVkKF8BIfWhoqHYySdNUdZBakX
=dawU
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ