Errata overview
Errata ID 274
Date 2019-09-18
Source package faad2
Fixed in version 2.8.0~cvs20161113-1+deb9u2
Description
This update addresses the following issues:
* There was a heap-based buffer overflow in the function excluded_channels()
  in libfaad/syntax.c. (CVE-2018-19502)
* There was a stack-based buffer overflow in the function calculate_gain() in
  libfaad/sbr_hfadj.c. (CVE-2018-19503)
* There is a NULL pointer dereference in ifilter_bank() in
  libfaad/filtbank.c. (CVE-2018-19504)
* There is a stack-based buffer underflow in the third instance of the
  calculate_gain function in libfaad/sbr_hfadj.c. A crafted input will lead
  to a denial of service or possibly unspecified other impact because
  limiting the additional noise energy level is mishandled for the G_max <= G
  case. (CVE-2018-20194)
* A NULL pointer dereference was discovered in ic_predict of
  libfaad/ic_predict.c. The vulnerability causes a segmentation fault and
  application crash, which leads to denial of service. (CVE-2018-20195)
* There is a stack-based buffer underflow in the third instance of the
  calculate_gain function in libfaad/sbr_hfadj.c. A crafted input will lead
  to a denial of service or possibly unspecified other impact because
  limiting the additional noise energy level is mishandled for the G_max > G
  case. (CVE-2018-20197)
* A NULL pointer dereference was discovered in ifilter_bank of
  libfaad/filtbank.c. The vulnerability causes a segmentation fault and
  application crash, which leads to denial of service because adding to
  windowed output is mishandled in the LONG_START_SEQUENCE case.
  (CVE-2018-20198)
* A NULL pointer dereference was discovered in sbr_process_channel of
  libfaad/sbr_dec.c. The vulnerability causes a segmentation fault and
  application crash. (CVE-2018-20357)
* An invalid memory address dereference was discovered in the lt_prediction
  function of libfaad/lt_predict.c. The vulnerability causes a segmentation
  fault and application crash, which leads to denial of service.
  (CVE-2018-20358)
* An invalid memory address dereference was discovered in the
  sbrDecodeSingleFramePS function of libfaad/sbr_dec.c. The vulnerability
  causes a segmentation fault and application crash, which leads to denial of
  service. (CVE-2018-20359)
* An invalid memory address dereference was discovered in the hf_assembly
  function of libfaad/sbr_hfadj.c. The vulnerability causes a segmentation
  fault and application crash, which leads to denial of service.
  (CVE-2018-20361)
* A NULL pointer dereference was discovered in ifilter_bank of
  libfaad/filtbank.c. The vulnerability causes a segmentation fault and
  application crash because adding to windowed output is mishandled in the
  EIGHT_SHORT_SEQUENCE case. (CVE-2018-20362)
* The faad_resetbits function in libfaad/bits.c is affected by a buffer
  overflow vulnerability. The number of bits to be read is determined by
  ld->buffer_size - words*4, cast to uint32. If ld->buffer_size - words*4 is
  negative, a buffer overflow is later performed via
  getdword_n(&ld->start[words], ld->bytes_left). (CVE-2019-15296)
Additional notes
CVE ID CVE-2018-19502
CVE-2018-19503
CVE-2018-19504
CVE-2018-20194
CVE-2018-20195
CVE-2018-20197
CVE-2018-20198
CVE-2018-20357
CVE-2018-20358
CVE-2018-20359
CVE-2018-20361
CVE-2018-20362
CVE-2019-15296
UCS Bug number #50194