Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

libsndfile 1.0.28 contains multiple security bugs #57833

Closed
manxorist opened this issue Jul 11, 2020 · 8 comments
Closed

libsndfile 1.0.28 contains multiple security bugs #57833

manxorist opened this issue Jul 11, 2020 · 8 comments
Labels
outdated PR was locked due to age

Comments

@manxorist
Copy link
Contributor

libsndfile 1.0.28 contains multiple security bugs. See https://www.cvedetails.com/vulnerability-list/vendor_id-16294/product_id-36889/Libsndfile-Project-Libsndfile.html. Amongst others, also CVE-2017-12562, which causes a crash in openmpt123 (https://lib.openmpt.org/) when rendering to wav files. See https://bugs.openmpt.org/view.php?id=974 and libsndfile/libsndfile#292.

Please update to at least libsndfile 1.0.29-pre2 or get the fixes for this CVE (and others) from git master. See libsndfile/libsndfile#470 for further discussion.

Other distributions (like e.g. Debian (https://security-tracker.debian.org/tracker/source-package/libsndfile)) have already fixed these issues.

@SMillerDev
Copy link
Member

Please make a pull request to patch these.

@claui claui added the help wanted Task(s) needing PRs from the community or maintainers label Jul 11, 2020
@manxorist
Copy link
Contributor Author

I am no homebrew developer nor a homebrew user. I do not even own any Apple hardware that could run any recent macOS version which I could run homebrew on. I will be completely unable to test any pull request I submit.

I'm the libopenmpt and openmpt123 maintainer, who is just somewhat annoyed that homebrew after 3 years still does ship libsndfile 1.0.28 unpatched, which has known security vulnerabilities since 3 years now, which cause crashes in openmpt123, which waste my time.
Doesn't homebrew track security issues in the packages it ships?

Note that I am equally annoyed with the libsndfile release process.

Do you still want me to submit a pull request that I am certainly unable to test?

@SMillerDev
Copy link
Member

Yeah, we have CI to test it if needed (and homebrew is available on Linux in docker). And we only check for new releases, we depend on the community to provide pull requests for issues they encounter.

@claui
Copy link
Contributor

claui commented Jul 11, 2020

Doesn't homebrew track security issues in the packages it ships?

Homebrew doesn’t have the resources to track security issues unless there’s an upstream version bump. Monitoring security issues may not even be a good investment of maintainer time: I’d really expect that upstream projects tag a release whenever they fix a really critical security issue.

Note that for many kinds of package repositories, tracking security advisories and patches may make sense, e. g. Debian. But those are typically not rolling, and tend to maintain older versions, which they must patch until the next distro release.
Homebrew aims to be a rolling repository, which pulls the latest stable release as soon as possible. So it’d feel rather pointless for us to dedicate maintainer resources for monitoring security bulletins.

Do you still want me to submit a pull request that I am certainly unable to test?

If you’re ok with that, yes, that’d be super helpful.
Feel free to do whatever you can. We’ll be happy to help with the rest.

@claui
Copy link
Contributor

claui commented Jul 11, 2020

Just for the record: it seems that none of the CVEs have been confirmed to be more than DoS-level so far.

@manxorist
Copy link
Contributor Author

Doesn't homebrew track security issues in the packages it ships?

Note that for many kinds of package repositories, tracking security advisories and patches may make sense, e. g. Debian. But those are typically not rolling, and tend to maintain older versions, which they must patch until the next distro release.
Homebrew aims to be a rolling repository, which pulls the latest stable release as soon as possible. So it’d feel rather pointless for us to dedicate maintainer resources for monitoring security bulletins.

Understood. Well, fair enough, I guess. So the root problem here is that libsndfile did not do a proper release since 3 years, which sadly causes homebrew to not pick up the fixes, which causes problems in openmpt123.

@manxorist
Copy link
Contributor Author

Just for the record: it seems that none of the CVEs have been confirmed to be more than DoS-level so far.

I disagree with the library author here.

Unless proven otherwise, every buffer overflow should be considered exploitable. See https://googleprojectzero.blogspot.com/2014/08/the-poisoned-nul-byte-2014-edition.html, especially the conclusion.

@claui
Copy link
Contributor

claui commented Jul 11, 2020

@manxorist You’re not wrong. That’s why I said they haven’t been confirmed. I haven’t looked at the CVEs myself (other than identifying the relevant upstream PR numbers).

SMillerDev pushed a commit to manxorist/homebrew-core that referenced this issue Jul 11, 2020
@claui claui removed the help wanted Task(s) needing PRs from the community or maintainers label Jul 11, 2020
@BrewTestBot BrewTestBot added the outdated PR was locked due to age label Dec 1, 2020
@Homebrew Homebrew locked as resolved and limited conversation to collaborators Dec 1, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
outdated PR was locked due to age
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants