<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for lame</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:0544-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-02-26T07:35:52Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-02-26T07:35:52Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-02-26T07:35:52Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for lame</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for lame fixes the following issues:

Lame was updated to version 3.100:

  * Improved detection of MPEG audio data in RIFF WAVE files.
     sf#3545112 Invalid sampling detection
  * New switch --gain &lt;decibel&gt;, range -20.0 to +12.0, a more
    convenient way to apply Gain adjustment in decibels, 
    than the use of --scale &lt;factor&gt;.
  * Fix for sf#3558466 Bug in path handling
  * Fix for sf#3567844 problem with Tag genre
  * Fix for sf#3565659 no progress indication with pipe input
  * Fix for sf#3544957 scale (empty) silent encode without warning
  * Fix for sf#3580176 environment variable LAMEOPT doesn't
    work anymore
  * Fix for sf#3608583 input file name displayed with wrong
    character encoding (on windows console with CP_UTF8)
  * Fix dereference NULL and Buffer not NULL terminated issues.
    (CVE-2017-15019 bsc#1082317 CVE-2017-13712 bsc#1082399 CVE-2015-9100 bsc#1082401)
  * Fix dereference of a null pointer possible in loop.
  * Make sure functions with SSE instructions maintain their own
    properly aligned stack. Thanks to Fabian Greffrath
  * Multiple Stack and Heap Corruptions from Malicious File.
    (CVE-2017-9872 bsc#1082391 CVE-2017-9871 bsc#1082392 CVE-2017-9870 bsc#1082393
     CVE-2017-9869 bsc#1082395 CVE-2017-9411 bsc#1082397 CVE-2015-9101 bsc#1082400)
  * CVE-2017-11720: Fix a division by zero vulnerability. (bsc#1082311)
  * CVE-2017-9410: Fix fill_buffer_resample function in
    libmp3lame/util.c heap-based buffer over-read and ap (bsc#1082333)
  * CVE-2017-9411: Fix fill_buffer_resample function in
    libmp3lame/util.c invalid memory read and application crash (bsc#1082397)
  * CVE-2017-9412: FIx unpack_read_samples function in 
    frontend/get_audio.c invalid memory read and application crash (bsc#1082340)
  * Fix clip detect scale suggestion unaware of scale input value
  * HIP decoder bug fixed: decoding mixed blocks of lower sample
    frequency Layer3 data resulted in internal buffer overflow.
  * Add lame_encode_buffer_interleaved_int()

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2018-214</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH623JZ3J2KZAJL44XIFV3PAHON2NVKG/#KH623JZ3J2KZAJL44XIFV3PAHON2NVKG</URL>
      <Description>E-Mail link for openSUSE-SU-2018:0544-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082311</URL>
      <Description>SUSE Bug 1082311</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082317</URL>
      <Description>SUSE Bug 1082317</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082333</URL>
      <Description>SUSE Bug 1082333</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082340</URL>
      <Description>SUSE Bug 1082340</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082391</URL>
      <Description>SUSE Bug 1082391</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082392</URL>
      <Description>SUSE Bug 1082392</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082393</URL>
      <Description>SUSE Bug 1082393</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082395</URL>
      <Description>SUSE Bug 1082395</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082397</URL>
      <Description>SUSE Bug 1082397</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082399</URL>
      <Description>SUSE Bug 1082399</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082400</URL>
      <Description>SUSE Bug 1082400</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082401</URL>
      <Description>SUSE Bug 1082401</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-9100/</URL>
      <Description>SUSE CVE CVE-2015-9100 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-9101/</URL>
      <Description>SUSE CVE CVE-2015-9101 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-11720/</URL>
      <Description>SUSE CVE CVE-2017-11720 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13712/</URL>
      <Description>SUSE CVE CVE-2017-13712 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15019/</URL>
      <Description>SUSE CVE CVE-2017-15019 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9410/</URL>
      <Description>SUSE CVE CVE-2017-9410 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9411/</URL>
      <Description>SUSE CVE CVE-2017-9411 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9412/</URL>
      <Description>SUSE CVE CVE-2017-9412 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9869/</URL>
      <Description>SUSE CVE CVE-2017-9869 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9870/</URL>
      <Description>SUSE CVE CVE-2017-9870 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9871/</URL>
      <Description>SUSE CVE CVE-2017-9871 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9872/</URL>
      <Description>SUSE CVE CVE-2017-9872 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 12 SP2">
      <Branch Type="Product Name" Name="SUSE Package Hub 12 SP2">
        <FullProductName ProductID="SUSE Package Hub 12 SP2" CPE="cpe:/o:suse:packagehub:12:sp2">SUSE Package Hub 12 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="lame-3.100-6.1">
      <FullProductName ProductID="lame-3.100-6.1">lame-3.100-6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="lame-doc-3.100-6.1">
      <FullProductName ProductID="lame-doc-3.100-6.1">lame-doc-3.100-6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="lame-mp3rtp-3.100-6.1">
      <FullProductName ProductID="lame-mp3rtp-3.100-6.1">lame-mp3rtp-3.100-6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmp3lame-devel-3.100-6.1">
      <FullProductName ProductID="libmp3lame-devel-3.100-6.1">libmp3lame-devel-3.100-6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmp3lame0-3.100-6.1">
      <FullProductName ProductID="libmp3lame0-3.100-6.1">libmp3lame0-3.100-6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="lame-3.100-6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12 SP2">
      <FullProductName ProductID="SUSE Package Hub 12 SP2:lame-3.100-6.1">lame-3.100-6.1 as a component of SUSE Package Hub 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="lame-doc-3.100-6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12 SP2">
      <FullProductName ProductID="SUSE Package Hub 12 SP2:lame-doc-3.100-6.1">lame-doc-3.100-6.1 as a component of SUSE Package Hub 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="lame-mp3rtp-3.100-6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12 SP2">
      <FullProductName ProductID="SUSE Package Hub 12 SP2:lame-mp3rtp-3.100-6.1">lame-mp3rtp-3.100-6.1 as a component of SUSE Package Hub 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmp3lame-devel-3.100-6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12 SP2">
      <FullProductName ProductID="SUSE Package Hub 12 SP2:libmp3lame-devel-3.100-6.1">libmp3lame-devel-3.100-6.1 as a component of SUSE Package Hub 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmp3lame0-3.100-6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12 SP2">
      <FullProductName ProductID="SUSE Package Hub 12 SP2:libmp3lame0-3.100-6.1">libmp3lame0-3.100-6.1 as a component of SUSE Package Hub 12 SP2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The fill_buffer_resample function in util.c in libmp3lame.a in LAME 3.99.5 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted audio file.</Note>
    </Notes>
    <CVE>CVE-2015-9100</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:lame-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:lame-doc-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:lame-mp3rtp-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:libmp3lame-devel-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:libmp3lame0-3.100-6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH623JZ3J2KZAJL44XIFV3PAHON2NVKG/#KH623JZ3J2KZAJL44XIFV3PAHON2NVKG</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-9100.html</URL>
        <Description>CVE-2015-9100</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082401</URL>
        <Description>SUSE Bug 1082401</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The fill_buffer_resample function in util.c in libmp3lame.a in LAME 3.98.4, 3.98.2, 3.98, 3.99, 3.99.1, 3.99.2, 3.99.3, 3.99.4 and 3.99.5 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted audio file.</Note>
    </Notes>
    <CVE>CVE-2015-9101</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:lame-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:lame-doc-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:lame-mp3rtp-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:libmp3lame-devel-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:libmp3lame0-3.100-6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH623JZ3J2KZAJL44XIFV3PAHON2NVKG/#KH623JZ3J2KZAJL44XIFV3PAHON2NVKG</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-9101.html</URL>
        <Description>CVE-2015-9101</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082400</URL>
        <Description>SUSE Bug 1082400</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There is a division-by-zero vulnerability in LAME 3.99.5, caused by a malformed input file.</Note>
    </Notes>
    <CVE>CVE-2017-11720</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:lame-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:lame-doc-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:lame-mp3rtp-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:libmp3lame-devel-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:libmp3lame0-3.100-6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH623JZ3J2KZAJL44XIFV3PAHON2NVKG/#KH623JZ3J2KZAJL44XIFV3PAHON2NVKG</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11720.html</URL>
        <Description>CVE-2017-11720</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082311</URL>
        <Description>SUSE Bug 1082311</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082397</URL>
        <Description>SUSE Bug 1082397</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NULL Pointer Dereference in the id3v2AddAudioDuration function in libmp3lame/id3tag.c in LAME 3.99.5 allows attackers to perform Denial of Service by triggering a NULL first argument.</Note>
    </Notes>
    <CVE>CVE-2017-13712</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:lame-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:lame-doc-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:lame-mp3rtp-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:libmp3lame-devel-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:libmp3lame0-3.100-6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH623JZ3J2KZAJL44XIFV3PAHON2NVKG/#KH623JZ3J2KZAJL44XIFV3PAHON2NVKG</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13712.html</URL>
        <Description>CVE-2017-13712</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082399</URL>
        <Description>SUSE Bug 1082399</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LAME 3.99.5 has a NULL Pointer Dereference in the hip_decode_init function within libmp3lame/mpglib_interface.c via a malformed mpg file, because of an incorrect calloc call.</Note>
    </Notes>
    <CVE>CVE-2017-15019</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:lame-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:lame-doc-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:lame-mp3rtp-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:libmp3lame-devel-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:libmp3lame0-3.100-6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH623JZ3J2KZAJL44XIFV3PAHON2NVKG/#KH623JZ3J2KZAJL44XIFV3PAHON2NVKG</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15019.html</URL>
        <Description>CVE-2017-15019</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082317</URL>
        <Description>SUSE Bug 1082317</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2015-9101. Reason: This candidate is a duplicate of CVE-2015-9101. Notes: All CVE users should reference CVE-2015-9101 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2017-9410</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:lame-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:lame-doc-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:lame-mp3rtp-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:libmp3lame-devel-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:libmp3lame0-3.100-6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH623JZ3J2KZAJL44XIFV3PAHON2NVKG/#KH623JZ3J2KZAJL44XIFV3PAHON2NVKG</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9410.html</URL>
        <Description>CVE-2017-9410</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1061970</URL>
        <Description>SUSE Bug 1061970</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082333</URL>
        <Description>SUSE Bug 1082333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2015-9100. Reason: This candidate is a duplicate of CVE-2015-9100. Notes: All CVE users should reference CVE-2015-9100 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2017-9411</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:lame-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:lame-doc-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:lame-mp3rtp-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:libmp3lame-devel-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:libmp3lame0-3.100-6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH623JZ3J2KZAJL44XIFV3PAHON2NVKG/#KH623JZ3J2KZAJL44XIFV3PAHON2NVKG</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9411.html</URL>
        <Description>CVE-2017-9411</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082397</URL>
        <Description>SUSE Bug 1082397</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The unpack_read_samples function in frontend/get_audio.c in LAME 3.99.5 allows remote attackers to cause a denial of service (invalid memory read and application crash) via a crafted wav file.</Note>
    </Notes>
    <CVE>CVE-2017-9412</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:lame-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:lame-doc-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:lame-mp3rtp-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:libmp3lame-devel-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:libmp3lame0-3.100-6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH623JZ3J2KZAJL44XIFV3PAHON2NVKG/#KH623JZ3J2KZAJL44XIFV3PAHON2NVKG</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9412.html</URL>
        <Description>CVE-2017-9412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1061973</URL>
        <Description>SUSE Bug 1061973</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082340</URL>
        <Description>SUSE Bug 1082340</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The II_step_one function in layer2.c in mpglib, as used in libmpgdecoder.a in LAME 3.99.5 and other products, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted audio file.</Note>
    </Notes>
    <CVE>CVE-2017-9869</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:lame-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:lame-doc-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:lame-mp3rtp-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:libmp3lame-devel-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:libmp3lame0-3.100-6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH623JZ3J2KZAJL44XIFV3PAHON2NVKG/#KH623JZ3J2KZAJL44XIFV3PAHON2NVKG</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9869.html</URL>
        <Description>CVE-2017-9869</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082395</URL>
        <Description>SUSE Bug 1082395</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The III_i_stereo function in layer3.c in mpglib, as used in libmpgdecoder.a in LAME 3.99.5 and other products, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted audio file that is mishandled in the code for the "block_type == 2" case, a similar issue to CVE-2017-11126.</Note>
    </Notes>
    <CVE>CVE-2017-9870</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:lame-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:lame-doc-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:lame-mp3rtp-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:libmp3lame-devel-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:libmp3lame0-3.100-6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH623JZ3J2KZAJL44XIFV3PAHON2NVKG/#KH623JZ3J2KZAJL44XIFV3PAHON2NVKG</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9870.html</URL>
        <Description>CVE-2017-9870</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1046766</URL>
        <Description>SUSE Bug 1046766</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082393</URL>
        <Description>SUSE Bug 1082393</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The III_i_stereo function in layer3.c in mpglib, as used in libmpgdecoder.a in LAME 3.99.5 and other products, allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted audio file.</Note>
    </Notes>
    <CVE>CVE-2017-9871</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:lame-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:lame-doc-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:lame-mp3rtp-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:libmp3lame-devel-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:libmp3lame0-3.100-6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH623JZ3J2KZAJL44XIFV3PAHON2NVKG/#KH623JZ3J2KZAJL44XIFV3PAHON2NVKG</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9871.html</URL>
        <Description>CVE-2017-9871</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082392</URL>
        <Description>SUSE Bug 1082392</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The III_dequantize_sample function in layer3.c in mpglib, as used in libmpgdecoder.a in LAME 3.99.5 and other products, allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted audio file.</Note>
    </Notes>
    <CVE>CVE-2017-9872</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:lame-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:lame-doc-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:lame-mp3rtp-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:libmp3lame-devel-3.100-6.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:libmp3lame0-3.100-6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH623JZ3J2KZAJL44XIFV3PAHON2NVKG/#KH623JZ3J2KZAJL44XIFV3PAHON2NVKG</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9872.html</URL>
        <Description>CVE-2017-9872</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082391</URL>
        <Description>SUSE Bug 1082391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092153</URL>
        <Description>SUSE Bug 1092153</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199458</URL>
        <Description>SUSE Bug 1199458</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
