Name | CVE-2007-4029 |
Description | libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service via (1) an invalid mapping type, which triggers an out-of-bounds read in the vorbis_info_clear function in info.c, and (2) invalid blocksize values that trigger a segmentation fault in the read function in block.c. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-1471-1 |
Debian Bugs | 437916, 669196 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
libvorbis (PTS) | bookworm, bullseye | 1.3.7-1 | fixed |
sid, trixie | 1.3.7-2 | fixed | |
libvorbisidec (PTS) | sid, trixie, bookworm, bullseye | 1.2.1+git20180316-7 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
libvorbis | source | sarge | 1.1.0-2 | DSA-1471-1 | ||
libvorbis | source | etch | 1.1.2.dfsg-1.3 | DSA-1471-1 | ||
libvorbis | source | (unstable) | 1.2.0.dfsg-1 | medium | 437916 | |
libvorbisidec | source | (unstable) | 1.0.2+svn16259-2 | 669196 |
svn revisions fixing this https://bugzilla.redhat.com/show_bug.cgi?id=249780