Jump to content
Compatible Support Forums
Sign in to follow this  
news

[RHSA-2008:0271-01] Important: libvorbis security update

Recommended Posts

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

=====================================================================

Red Hat Security Advisory

 

Synopsis: Important: libvorbis security update

Advisory ID: RHSA-2008:0271-01

Product: Red Hat Enterprise Linux

Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0271.html

Issue date: 2008-05-14

CVE Names: CVE-2008-1419 CVE-2008-1420 CVE-2008-1423

CVE-2008-2009

=====================================================================

 

1. Summary:

 

Updated libvorbis packages that fix various security issues are now

available for Red Hat Enterprise Linux 2.1.

 

This update has been rated as having important security impact by the Red

Hat Security Response Team.

 

2. Relevant releases/architectures:

 

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64

Red Hat Linux Advanced Workstation 2.1 - ia64

Red Hat Enterprise Linux ES version 2.1 - i386

Red Hat Enterprise Linux WS version 2.1 - i386

 

3. Description:

 

The libvorbis packages contain runtime libraries for use in programs that

support Ogg Vorbis. Ogg Vorbis is a fully open, non-proprietary, patent-and

royalty-free, general-purpose compressed audio format.

 

Will Drewry of the Google Security Team reported several flaws in the way

libvorbis processed audio data. An attacker could create a carefully

crafted OGG audio file in such a way that it could cause an application

linked with libvorbis to crash, or execute arbitrary code when it was

opened. (CVE-2008-1419, CVE-2008-1420, CVE-2008-1423, CVE-2008-2009)

 

Moreover, additional OGG file sanity-checks have been added to prevent

possible exploitation of similar issues in the future.

 

Users of libvorbis are advised to upgrade to these updated packages, which

contain backported patches to resolve these issues.

 

4. Solution:

 

Before applying this update, make sure that all previously-released

errata relevant to your system have been applied.

 

This update is available via Red Hat Network. Details on how to use

the Red Hat Network to apply this update are available at

http://kbase.redhat.com/faq/FAQ_58_10188

 

5. Bugs fixed (http://bugzilla.redhat.com/):

 

440700 - CVE-2008-1419 vorbis: zero-dim codebooks can cause crash, infinite loop or heap overflow

440706 - CVE-2008-1420 vorbis: integer overflow in partvals computation

440709 - CVE-2008-1423 vorbis: integer oveflow caused by huge codebooks

444443 - CVE-2008-2009 vorbis: insufficient validation of Huffman tree causing memory corruption in _make_decode_tree()

 

6. Package List:

 

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 :

 

Source:

ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/libvorbis-1.0rc2-9.el2.src.rpm

 

i386:

libvorbis-1.0rc2-9.el2.i386.rpm

libvorbis-devel-1.0rc2-9.el2.i386.rpm

 

ia64:

libvorbis-1.0rc2-9.el2.ia64.rpm

libvorbis-devel-1.0rc2-9.el2.ia64.rpm

 

Red Hat Linux Advanced Workstation 2.1:

 

Source:

ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/libvorbis-1.0rc2-9.el2.src.rpm

 

ia64:

libvorbis-1.0rc2-9.el2.ia64.rpm

libvorbis-devel-1.0rc2-9.el2.ia64.rpm

 

Red Hat Enterprise Linux ES version 2.1:

 

Source:

ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/libvorbis-1.0rc2-9.el2.src.rpm

 

i386:

libvorbis-1.0rc2-9.el2.i386.rpm

libvorbis-devel-1.0rc2-9.el2.i386.rpm

 

Red Hat Enterprise Linux WS version 2.1:

 

Source:

ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/libvorbis-1.0rc2-9.el2.src.rpm

 

i386:

libvorbis-1.0rc2-9.el2.i386.rpm

libvorbis-devel-1.0rc2-9.el2.i386.rpm

 

These packages are GPG signed by Red Hat for security. Our key and

details on how to verify the signature are available from

https://www.redhat.com/security/team/key/#package

 

7. References:

 

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1419

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1420

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1423

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2009

http://www.redhat.com/security/updates/classification/#important

 

8. Contact:

 

The Red Hat security contact is . More contact

details at https://www.redhat.com/security/team/contact/

 

Copyright 2008 Red Hat, Inc.

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.4.4 (GNU/Linux)

 

iD8DBQFIKp76XlSAg2UNWIIRAvRkAJ9nwrMgcKpfuCB9QEtQoLR5mHBO4ACeMJsB

Yjvm/Op0zu9UzJvMpOcqTMw=

=xleg

-----END PGP SIGNATURE-----

 

 

--

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×