MGASA-2018-0236

Source
https://advisories.mageia.org/MGASA-2018-0236.html
Import Source
https://advisories.mageia.org/MGASA-2018-0236.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2018-0236
Related
Published
2018-05-16T08:24:56Z
Modified
2018-05-16T07:39:55Z
Summary
Updated libsndfile packages fix security vulnerabilities
Details

An out of bounds read in the function d2alaw_array() in alaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of the NAN and INFINITY floating-point values (CVE-2017-14245).

An out of bounds read in the function d2ulaw_array() in ulaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of the NAN and INFINITY floating-point values (CVE-2017-14246).

In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file (CVE-2017-14634).

Divide-by-zero in the function wavw64readfmtchunk(), which may lead to Denial of service (CVE-2017-16942).

Note that CVE-2017-16942 only affected Mageia 5.

References
Credits

Affected packages