Gentoo Archives: gentoo-announce

From: Thomas Deutschmann <whissi@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 201702-21 ] Opus: User-assisted execution of arbitrary code
Date: Tue, 21 Feb 2017 00:06:44
Message-Id: 13ca99e2-0b25-2bed-312c-ef42c195f201@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201702-21
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Opus: User-assisted execution of arbitrary code
9 Date: February 20, 2017
10 Bugs: #605894
11 ID: 201702-21
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A vulnerability in Opus could cause memory corruption.
19
20 Background
21 ==========
22
23 Opus is a totally open, royalty-free, highly versatile audio codec.
24
25 Affected packages
26 =================
27
28 -------------------------------------------------------------------
29 Package / Vulnerable / Unaffected
30 -------------------------------------------------------------------
31 1 media-libs/opus < 1.1.3-r1 >= 1.1.3-r1
32
33 Description
34 ===========
35
36 A large NLSF values could cause the stabilization code in
37 silk/NLSF_stabilize.c to wrap-around and have the last value in
38 NLSF_Q15[] to be negative, close to -32768.
39
40 Under normal circumstances, the code will simply read from the wrong
41 table resulting in an unstable LPC filter. The filter would then go
42 through the LPC stabilization code at the end of silk_NLSF2A().
43
44 Ultimately, the output audio would be garbage, but no worse than with
45 any other harmless bad packet.
46
47 Please see the referenced upstream patch and Debian bug report below
48 for a detailed analysis.
49
50 However, the original report was about a successful exploitation of
51 Android's Mediaserver in conjunction with this vulnerability.
52
53 Impact
54 ======
55
56 A remote attacker could entice a user to open a specially crafted media
57 stream, possibly resulting in execution of arbitrary code with the
58 privileges of the process, or a Denial of Service condition.
59
60 Workaround
61 ==========
62
63 There is no known workaround at this time.
64
65 Resolution
66 ==========
67
68 All Opus users should upgrade to the latest version:
69
70 # emerge --sync
71 # emerge --ask --oneshot --verbose ">=media-libs/opus-1.1.3-r1"
72
73 References
74 ==========
75
76 [ 1 ] CVE-2017-0381
77 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0381
78 [ 2 ] Debian Bug 851612
79 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851612#10
80 [ 3 ] Upstream patch
81 https://git.xiph.org/?p=opus.git;a=commitdiff;h=70a3d641b
82
83 Availability
84 ============
85
86 This GLSA and any updates to it are available for viewing at
87 the Gentoo Security Website:
88
89 https://security.gentoo.org/glsa/201702-21
90
91 Concerns?
92 =========
93
94 Security is a primary focus of Gentoo Linux and ensuring the
95 confidentiality and security of our users' machines is of utmost
96 importance to us. Any security concerns should be addressed to
97 security@g.o or alternatively, you may file a bug at
98 https://bugs.gentoo.org.
99
100 License
101 =======
102
103 Copyright 2017 Gentoo Foundation, Inc; referenced text
104 belongs to its owner(s).
105
106 The contents of this document are licensed under the
107 Creative Commons - Attribution / Share Alike license.
108
109 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature