diff options
author | Peter Korsgaard <peter@korsgaard.com> | 2018-05-21 15:27:20 +0200 |
---|---|---|
committer | Peter Korsgaard <peter@korsgaard.com> | 2018-05-21 17:47:08 +0200 |
commit | bc730557571815cbb42a52b1f26d7119d1d14ac3 (patch) | |
tree | 5cf18efc9dc72ddb1e3eb505c93f4f75d9dd6653 /package/bash-completion | |
parent | 1d8afca9c69dc5246736d20d6e6ed266ccb70387 (diff) | |
download | buildroot-bc730557571815cbb42a52b1f26d7119d1d14ac3.tar.gz buildroot-bc730557571815cbb42a52b1f26d7119d1d14ac3.zip |
wavpack: add upstream security fixes
Fixes the following security issues:
CVE-2018-10536: An issue was discovered in WavPack 5.1.0 and earlier. The
WAV parser component contains a vulnerability that allows writing to memory
because ParseRiffHeaderConfig in riff.c does not reject multiple format
chunks.
CVE-2018-10537: An issue was discovered in WavPack 5.1.0 and earlier. The
W64 parser component contains a vulnerability that allows writing to memory
because ParseWave64HeaderConfig in wave64.c does not reject multiple format
chunks.
CVE-2018-10538: An issue was discovered in WavPack 5.1.0 and earlier for WAV
input. Out-of-bounds writes can occur because ParseRiffHeaderConfig in
riff.c does not validate the sizes of unknown chunks before attempting
memory allocation, related to a lack of integer-overflow protection within a
bytes_to_copy calculation and subsequent malloc call, leading to
insufficient memory allocation.
CVE-2018-10539: An issue was discovered in WavPack 5.1.0 and earlier for
DSDiff input. Out-of-bounds writes can occur because
ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown
chunks before attempting memory allocation, related to a lack of
integer-overflow protection within a bytes_to_copy calculation and
subsequent malloc call, leading to insufficient memory allocation.
CVE-2018-10540: An issue was discovered in WavPack 5.1.0 and earlier for W64
input. Out-of-bounds writes can occur because ParseWave64HeaderConfig in
wave64.c does not validate the sizes of unknown chunks before attempting
memory allocation, related to a lack of integer-overflow protection within a
bytes_to_copy calculation and subsequent malloc call, leading to
insufficient memory allocation.
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Diffstat (limited to 'package/bash-completion')
0 files changed, 0 insertions, 0 deletions