Bug 1213451 (CVE-2022-33065)

Summary: VUL-0: CVE-2022-33065: libsndfile: signed integers overflows in au_read_header() in src/au.c and in mat4_open() and mat4_read_header() in src/mat4.c
Product: [Novell Products] SUSE Security Incidents Reporter: Robert Frohl <rfrohl>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: lidong.zhong, security-team, tiwai
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/372813/
Whiteboard: CVSSv3.1:SUSE:CVE-2022-33065:7.8:(AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Robert Frohl 2023-07-19 07:22:46 UTC
CVE-2022-33065

Multiple signed integers overflow in function au_read_header in src/au.c and in
functions mat4_open and mat4_read_header in src/mat4.c in Libsndfile, allows an
attacker to cause Denial of Service or other unspecified impacts.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-33065
https://www.cve.org/CVERecord?id=CVE-2022-33065
https://github.com/libsndfile/libsndfile/issues/789
https://github.com/libsndfile/libsndfile/issues/833
Comment 2 Takashi Iwai 2023-10-20 12:24:13 UTC
The fix provided in the upstream commit
  https://github.com/libsndfile/libsndfile/commit/0754562e13d2e63a248a1c82f90b30bc0ffe307c

I backported to TW (together with the version update to 1.2.2).  The fix is backported to SUSE:SLE-15:Update and SUSE:SLE-12:Update, too.
I suppose we don't need the fix for older releases?
Comment 3 Takashi Iwai 2023-10-21 08:42:05 UTC
Submitted to ALP, too.

Reassigned back to security team.
Comment 6 Maintenance Automation 2023-11-01 08:30:04 UTC
SUSE-SU-2023:4331-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1213451
CVE References: CVE-2022-33065
Sources used:
SUSE Linux Enterprise Software Development Kit 12 SP5 (src): libsndfile-1.0.25-36.29.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): libsndfile-1.0.25-36.29.1
SUSE Linux Enterprise Server 12 SP5 (src): libsndfile-1.0.25-36.29.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): libsndfile-1.0.25-36.29.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Maintenance Automation 2023-11-01 08:30:06 UTC
SUSE-SU-2023:4330-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1213451
CVE References: CVE-2022-33065
Sources used:
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): libsndfile-1.0.28-150000.5.20.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): libsndfile-1.0.28-150000.5.20.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): libsndfile-1.0.28-150000.5.20.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): libsndfile-1.0.28-150000.5.20.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): libsndfile-1.0.28-150000.5.20.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): libsndfile-1.0.28-150000.5.20.1
SUSE Manager Proxy 4.2 (src): libsndfile-1.0.28-150000.5.20.1
SUSE Manager Retail Branch Server 4.2 (src): libsndfile-1.0.28-150000.5.20.1
SUSE Manager Server 4.2 (src): libsndfile-1.0.28-150000.5.20.1
SUSE Enterprise Storage 7.1 (src): libsndfile-1.0.28-150000.5.20.1
SUSE CaaS Platform 4.0 (src): libsndfile-1.0.28-150000.5.20.1
openSUSE Leap 15.4 (src): libsndfile-1.0.28-150000.5.20.1, libsndfile-progs-1.0.28-150000.5.20.1
openSUSE Leap 15.5 (src): libsndfile-1.0.28-150000.5.20.1, libsndfile-progs-1.0.28-150000.5.20.1
Basesystem Module 15-SP4 (src): libsndfile-1.0.28-150000.5.20.1
Basesystem Module 15-SP5 (src): libsndfile-1.0.28-150000.5.20.1
SUSE Package Hub 15 15-SP4 (src): libsndfile-1.0.28-150000.5.20.1
SUSE Package Hub 15 15-SP5 (src): libsndfile-1.0.28-150000.5.20.1
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): libsndfile-1.0.28-150000.5.20.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): libsndfile-1.0.28-150000.5.20.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): libsndfile-1.0.28-150000.5.20.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): libsndfile-1.0.28-150000.5.20.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Lidong Zhong 2023-11-29 02:17:46 UTC
Hi Takashi, we have a customer requesting this CVE fix for SLE11-SP1, is it OK to build a PTF based on the commit in comment 2? The patch seems to be successfuly applied. Thanks.
Comment 9 Takashi Iwai 2023-11-29 07:26:28 UTC
(In reply to Lidong Zhong from comment #8)
> Hi Takashi, we have a customer requesting this CVE fix for SLE11-SP1, is it
> OK to build a PTF based on the commit in comment 2? The patch seems to be
> successfuly applied. Thanks.

Sure, go ahead.
It's a trivial change, and if it's cleanly applied, it should be fine.
Comment 10 Lidong Zhong 2023-11-30 07:59:53 UTC
(In reply to Takashi Iwai from comment #9)
> Sure, go ahead.
> It's a trivial change, and if it's cleanly applied, it should be fine.

Thanks for your reply. PTF is provided to customer.
Comment 11 Marcus Meissner 2024-04-18 09:25:10 UTC
released