Bug 2163898 (CVE-2022-47021)

Summary: CVE-2022-47021 opusfile: NULL pointer dereference in op_get_data() and op_open1() in opusfile.c
Product: [Other] Security Response Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED UPSTREAM QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-01-26 19:52:11 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2163907, 2163902, 2163905    
Bug Blocks:    

Description Guilherme de Almeida Suckevicz 2023-01-24 14:03:51 UTC
A null pointer dereference issue was discovered in functions op_get_data and op_open1 in opusfile.c in xiph opusfile 0.9 thru 0.12 allows attackers to cause denial of service or other unspecified impacts.

Reference:
https://github.com/xiph/opusfile/issues/36

Upstream patch:
https://github.com/xiph/opusfile/commit/0a4cd796df5b030cb866f3f4a5e41a4b92caddf5

Comment 1 Guilherme de Almeida Suckevicz 2023-01-24 14:04:25 UTC
Created mingw-opusfile tracking bugs for this issue:

Affects: fedora-all [bug 2163905]


Created opusfile tracking bugs for this issue:

Affects: epel-all [bug 2163907]
Affects: fedora-all [bug 2163902]

Comment 2 Product Security DevOps Team 2023-01-26 19:52:09 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.