MGASA-2018-0336

Source
https://advisories.mageia.org/MGASA-2018-0336.html
Import Source
https://advisories.mageia.org/MGASA-2018-0336.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2018-0336
Related
Published
2018-08-12T20:39:12Z
Modified
2018-08-12T20:16:48Z
Summary
Updated libsndfile packages fix security vulnerabilities
Details

Updated libsndfile package fixes security vulnerabilities:

The function d2alaw_array() in alaw.c of libsndfile 1.0.29pre1 may lead to a remote DoS attack (CVE-2017-17456).

The function d2ulaw_array() in ulaw.c of libsndfile 1.0.29pre1 may lead to a remote DoS attack (CVE-2017-17457).

A stack-based buffer overflow in psf_memset in common.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted audio file (CVE-2018-13139).

References
Credits

Affected packages

Mageia:6 / libsndfile

Package

Name
libsndfile
Purl
pkg:rpm/mageia/libsndfile?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.28-3.3.mga6

Ecosystem specific

{
    "section": "core"
}