MGASA-2018-0236

Source
https://advisories.mageia.org/MGASA-2018-0236.html
Import Source
https://advisories.mageia.org/MGASA-2018-0236.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2018-0236
Related
Published
2018-05-16T08:24:56Z
Modified
2018-05-16T07:39:55Z
Summary
Updated libsndfile packages fix security vulnerabilities
Details

An out of bounds read in the function d2alaw_array() in alaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of the NAN and INFINITY floating-point values (CVE-2017-14245).

An out of bounds read in the function d2ulaw_array() in ulaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of the NAN and INFINITY floating-point values (CVE-2017-14246).

In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file (CVE-2017-14634).

Divide-by-zero in the function wavw64readfmtchunk(), which may lead to Denial of service (CVE-2017-16942).

Note that CVE-2017-16942 only affected Mageia 5.

References
Credits

Affected packages

Mageia:6 / libsndfile

Package

Name
libsndfile
Purl
pkg:rpm/mageia/libsndfile?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.28-3.2.mga6

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / libsndfile

Package

Name
libsndfile
Purl
pkg:rpm/mageia/libsndfile?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.25-9.5.mga5

Ecosystem specific

{
    "section": "core"
}