Updated libsndfile packages fix security vulnerabilities
Publication date: 16 May 2018Modification date: 16 May 2018
Type: security
Affected Mageia releases : 5 , 6
CVE: CVE-2017-14245 , CVE-2017-14246 , CVE-2017-14634 , CVE-2017-16942
Description
An out of bounds read in the function d2alaw_array() in alaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of the NAN and INFINITY floating-point values (CVE-2017-14245). An out of bounds read in the function d2ulaw_array() in ulaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of the NAN and INFINITY floating-point values (CVE-2017-14246). In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file (CVE-2017-14634). Divide-by-zero in the function wav_w64_read_fmt_chunk(), which may lead to Denial of service (CVE-2017-16942). Note that CVE-2017-16942 only affected Mageia 5.
References
- https://bugs.mageia.org/show_bug.cgi?id=22561
- https://lists.opensuse.org/opensuse-updates/2018-02/msg00018.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14245
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14246
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14634
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16942
SRPMS
5/core
- libsndfile-1.0.25-9.5.mga5
6/core
- libsndfile-1.0.28-3.2.mga6