Updated dolphin-emu packages fix security vulnerability
Publication date: 05 May 2020Modification date: 14 Feb 2024
Type: security
Affected Mageia releases : 7
CVE: CVE-2017-9258 , CVE-2017-9259 , CVE-2017-9260 , CVE-2018-14044 , CVE-2018-14045 , CVE-2018-17096 , CVE-2018-17097 , CVE-2018-17098 , CVE-2018-1000223
Description
Updated dolphin-emu package fixes security vulnerabilities Dolphin Emulator includes a modified copy of the SoundTouch library at version 1.9.2. That version is subject to the following security issues: - The TDStretch::processSamples function in source/SoundTouch/TDStretch.cpp in SoundTouch 1.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted wav file (CVE-2017-9258) - The TDStretch::acceptNewOverlapLength function in source/SoundTouch/ TDStretch.cpp in SoundTouch 1.9.2 allows remote attackers to cause a denial of service (memory allocation error and application crash) via a crafted wav file (CVE-2017-9259). - The TDStretchSSE::calcCrossCorr function in source/SoundTouch/ sse_optimized.cpp in SoundTouch 1.9.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted wav file (CVE-2017-9260). - Reachable assertion in RateTransposer::setChannels() causing denial of service (CVE-2018-14044). - Reachable assertion in FIRFilter.cpp causing denial of service (CVE-2018-14045). - Assertion failure in BPMDetect class in BPMDetect.cpp (CVE-2018-17096). - Out-of-bounds heap write in WavOutFile::write() (CVE-2018-17097). - Heap corruption in WavFileBase class in WavFile.cpp (CVE-2018-17098). - Heap-based buffer overflow in SoundStretch/WavFile.cpp:WavInFile ::readHeaderBlock() potentially leading to code execution (CVE-2018-1000223). The bundled copy of SoundTouch was updated to version 2.1.2, thereby solving theses issues in Dolphin Emulator.
References
- https://bugs.mageia.org/show_bug.cgi?id=26555
- http://advisories.mageia.org/MGASA-2018-0331.html
- http://advisories.mageia.org/MGASA-2018-0385.html
- http://advisories.mageia.org/MGASA-2018-0462.html
- https://github.com/dolphin-emu/dolphin/pull/8725
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9258
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9259
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9260
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14044
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14045
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17096
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17097
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17098
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000223
SRPMS
7/tainted
- dolphin-emu-5.0.11824-1.mga7.tainted