summaryrefslogtreecommitdiffstats
path: root/package/bash-completion
diff options
context:
space:
mode:
authorPeter Korsgaard <peter@korsgaard.com>2018-05-21 15:27:20 +0200
committerPeter Korsgaard <peter@korsgaard.com>2018-05-21 17:47:08 +0200
commitbc730557571815cbb42a52b1f26d7119d1d14ac3 (patch)
tree5cf18efc9dc72ddb1e3eb505c93f4f75d9dd6653 /package/bash-completion
parent1d8afca9c69dc5246736d20d6e6ed266ccb70387 (diff)
downloadbuildroot-bc730557571815cbb42a52b1f26d7119d1d14ac3.tar.gz
buildroot-bc730557571815cbb42a52b1f26d7119d1d14ac3.zip
wavpack: add upstream security fixes
Fixes the following security issues: CVE-2018-10536: An issue was discovered in WavPack 5.1.0 and earlier. The WAV parser component contains a vulnerability that allows writing to memory because ParseRiffHeaderConfig in riff.c does not reject multiple format chunks. CVE-2018-10537: An issue was discovered in WavPack 5.1.0 and earlier. The W64 parser component contains a vulnerability that allows writing to memory because ParseWave64HeaderConfig in wave64.c does not reject multiple format chunks. CVE-2018-10538: An issue was discovered in WavPack 5.1.0 and earlier for WAV input. Out-of-bounds writes can occur because ParseRiffHeaderConfig in riff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation. CVE-2018-10539: An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation. CVE-2018-10540: An issue was discovered in WavPack 5.1.0 and earlier for W64 input. Out-of-bounds writes can occur because ParseWave64HeaderConfig in wave64.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation. Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Diffstat (limited to 'package/bash-completion')
0 files changed, 0 insertions, 0 deletions
OpenPOWER on IntegriCloud