![]() |
|
Message-ID: <20250425172447.GA29094@openwall.com> Date: Fri, 25 Apr 2025 19:24:47 +0200 From: Solar Designer <solar@...nwall.com> To: xiaolin <dongxiaolin@...pin.org> Cc: oss-security@...ts.openwall.com Subject: Re: CVE-2024-56431: libtheora: incorrect bitwise shift in huffdec.c On Fri, Apr 25, 2025 at 03:17:52PM +0800, xiaolin wrote: > Severity: > - moderate > > Affected versions: > - libtheora through 1.2.0 > > Fixed software: > - v1.2.0 > > Description: > A flaw was found in Theora (libtheora). An incorrect bitwise shift may be triggered via specially-crafted input, potentially resulting in an application crash. > > ------------------------------------------------------------- > References: > https://github.com/advisories/GHSA-8xp8-gmmj-xc8w > https://github.com/UnionTech-Software/openfhe-PoC The above link is to a wrong PoC, I think you meant this one: https://github.com/UnionTech-Software/libtheora-CVE-2024-56431-PoC > https://gitlab.xiph.org/xiph/theora/-/merge_requests/28 > https://gitlab.xiph.org/xiph/theora/-/commit/5665f86b8fd8345bb09469990e79221562ac204b This doesn't look like a security issue, so the CVE should be rejected unless there's justification. Just how would "an incorrect bitwise shift" result in "an application crash"? In a build with UbSan, sure. In a production build, it would not, unless the resulting incorrect computation result causes that, or the compiler can infer it at compile time (in which case it could correctly assume it's undefined behavior and optimize it out). Neither appears to be the case here. Also, the linked GitHub advisory currently shows a ridiculous CVSS score of 9.8 resulting from the CVSS vector specifying High impact for all of Confidentiality, Integrity, and Availability. But you only claim "application crash" impact, which (if it were for real) would mean no impact on Confidentiality and Integrity, but only on Availability. That said, thank you for your fuzzing efforts, for reporting and getting the bug fixed (even if non-security, it was still a bug), and for reporting this issue to oss-security anyway, which gives us a chance to dispute its security relevance. Alexander
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.