Bugzilla – Bug 1213451
VUL-0: CVE-2022-33065: libsndfile: signed integers overflows in au_read_header() in src/au.c and in mat4_open() and mat4_read_header() in src/mat4.c
Last modified: 2024-04-18 09:25:10 UTC
CVE-2022-33065 Multiple signed integers overflow in function au_read_header in src/au.c and in functions mat4_open and mat4_read_header in src/mat4.c in Libsndfile, allows an attacker to cause Denial of Service or other unspecified impacts. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-33065 https://www.cve.org/CVERecord?id=CVE-2022-33065 https://github.com/libsndfile/libsndfile/issues/789 https://github.com/libsndfile/libsndfile/issues/833
The fix provided in the upstream commit https://github.com/libsndfile/libsndfile/commit/0754562e13d2e63a248a1c82f90b30bc0ffe307c I backported to TW (together with the version update to 1.2.2). The fix is backported to SUSE:SLE-15:Update and SUSE:SLE-12:Update, too. I suppose we don't need the fix for older releases?
Submitted to ALP, too. Reassigned back to security team.
SUSE-SU-2023:4331-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1213451 CVE References: CVE-2022-33065 Sources used: SUSE Linux Enterprise Software Development Kit 12 SP5 (src): libsndfile-1.0.25-36.29.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): libsndfile-1.0.25-36.29.1 SUSE Linux Enterprise Server 12 SP5 (src): libsndfile-1.0.25-36.29.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): libsndfile-1.0.25-36.29.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4330-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1213451 CVE References: CVE-2022-33065 Sources used: SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): libsndfile-1.0.28-150000.5.20.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): libsndfile-1.0.28-150000.5.20.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): libsndfile-1.0.28-150000.5.20.1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): libsndfile-1.0.28-150000.5.20.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): libsndfile-1.0.28-150000.5.20.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): libsndfile-1.0.28-150000.5.20.1 SUSE Manager Proxy 4.2 (src): libsndfile-1.0.28-150000.5.20.1 SUSE Manager Retail Branch Server 4.2 (src): libsndfile-1.0.28-150000.5.20.1 SUSE Manager Server 4.2 (src): libsndfile-1.0.28-150000.5.20.1 SUSE Enterprise Storage 7.1 (src): libsndfile-1.0.28-150000.5.20.1 SUSE CaaS Platform 4.0 (src): libsndfile-1.0.28-150000.5.20.1 openSUSE Leap 15.4 (src): libsndfile-1.0.28-150000.5.20.1, libsndfile-progs-1.0.28-150000.5.20.1 openSUSE Leap 15.5 (src): libsndfile-1.0.28-150000.5.20.1, libsndfile-progs-1.0.28-150000.5.20.1 Basesystem Module 15-SP4 (src): libsndfile-1.0.28-150000.5.20.1 Basesystem Module 15-SP5 (src): libsndfile-1.0.28-150000.5.20.1 SUSE Package Hub 15 15-SP4 (src): libsndfile-1.0.28-150000.5.20.1 SUSE Package Hub 15 15-SP5 (src): libsndfile-1.0.28-150000.5.20.1 SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): libsndfile-1.0.28-150000.5.20.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): libsndfile-1.0.28-150000.5.20.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): libsndfile-1.0.28-150000.5.20.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): libsndfile-1.0.28-150000.5.20.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Hi Takashi, we have a customer requesting this CVE fix for SLE11-SP1, is it OK to build a PTF based on the commit in comment 2? The patch seems to be successfuly applied. Thanks.
(In reply to Lidong Zhong from comment #8) > Hi Takashi, we have a customer requesting this CVE fix for SLE11-SP1, is it > OK to build a PTF based on the commit in comment 2? The patch seems to be > successfuly applied. Thanks. Sure, go ahead. It's a trivial change, and if it's cleanly applied, it should be fine.
(In reply to Takashi Iwai from comment #9) > Sure, go ahead. > It's a trivial change, and if it's cleanly applied, it should be fine. Thanks for your reply. PTF is provided to customer.
released