CVE-2017-14632

NameCVE-2017-14632
DescriptionXiph.Org libvorbis 1.3.5 allows Remote Code Execution upon freeing uninitialized memory in the function vorbis_analysis_headerout() in info.c when vi->channels<=0, a similar issue to Mozilla bug 550184.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1368-1, DSA-4113-1
NVD severityhigh (attack range: remote)
Debian Bugs876779

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libvorbis (PTS)wheezy1.3.2-1.3vulnerable
wheezy (security)1.3.2-1.3+deb7u1fixed
jessie1.3.4-2fixed
jessie (security)1.3.4-2+deb8u1fixed
stretch1.3.5-4vulnerable
stretch (security)1.3.5-4+deb9u2fixed
buster, sid1.3.6-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libvorbissource(unstable)1.3.5-4.1high876779
libvorbissourcejessie(not affected)
libvorbissourcestretch1.3.5-4+deb9u1highDSA-4113-1
libvorbissourcewheezy1.3.2-1.3+deb7u1highDLA-1368-1

Notes

[jessie] - libvorbis <not-affected> (Vulnerable code not present)
[wheezy] - libvorbis <not-affected> (Vulnerable code not present)
https://gitlab.xiph.org/xiph/vorbis/issues/2328
https://github.com/xiph/vorbis/issues/29
https://github.com/xiph/vorbis/pull/34

Search for package or bug name: Reporting problems