SB2019092452 - Buffer overflow in faad2 (Alpine package)
Published: September 24, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2019-15296)
The vulnerability allows a local non-authenticated attacker to execute arbitrary code.
An issue was discovered in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The faad_resetbits function in libfaad/bits.c is affected by a buffer overflow vulnerability. The number of bits to be read is determined by ld->buffer_size - words*4, cast to uint32. If ld->buffer_size - words*4 is negative, a buffer overflow is later performed via getdword_n(&ld->start[words], ld->bytes_left).
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=345e3811719177be2d2edbf507a394cf92cfccb6
- https://git.alpinelinux.org/aports/commit/?id=3a9fa508128d243abee97ef41bd84a7847515f61
- https://git.alpinelinux.org/aports/commit/?id=e84bc7cecdbbd1563791416fd42384b047dc8c52
- https://git.alpinelinux.org/aports/commit/?id=fc0275095ee7d946a66d1f1e4713a943ccc05b78
- https://git.alpinelinux.org/aports/commit/?id=3f110aff54a0ff10332ae53c70a0fdc4fbd9f4ec