CVE-2007-4029

NameCVE-2007-4029
Descriptionlibvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service via (1) an invalid mapping type, which triggers an out-of-bounds read in the vorbis_info_clear function in info.c, and (2) invalid blocksize values that trigger a segmentation fault in the read function in block.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-1471-1
Debian Bugs437916, 669196

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libvorbis (PTS)jessie, jessie (lts)1.3.4-2+deb8u3fixed
stretch (security), stretch (lts), stretch1.3.5-4+deb9u3fixed
buster1.3.6-2fixed
bullseye, bookworm1.3.7-1fixed
sid, trixie1.3.7-2fixed
libvorbisidec (PTS)jessie, jessie (lts)1.0.2+svn18153-1~deb8u2fixed
stretch (security), stretch (lts), stretch1.0.2+svn18153-1+deb9u1fixed
buster1.2.1+git20180316-3fixed
bullseye, bookworm1.2.1+git20180316-7fixed
sid, trixie1.2.1+git20180316-8fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libvorbissourcesarge1.1.0-2DSA-1471-1
libvorbissourceetch1.1.2.dfsg-1.3DSA-1471-1
libvorbissource(unstable)1.2.0.dfsg-1medium437916
libvorbisidecsource(unstable)1.0.2+svn16259-2669196

Notes

svn revisions fixing this https://bugzilla.redhat.com/show_bug.cgi?id=249780

Search for package or bug name: Reporting problems