Bug#876682: libsndfile: CVE-2017-14245, CVE-2017-14246
Markus Koschany
apo at debian.org
Sun Sep 24 20:09:27 UTC 2017
Package: libsndfile
X-Debbugs-CC: team at security.debian.org
Severity: important
Tags: security
Hi,
the following vulnerabilities were published for libsndfile.
CVE-2017-14245[0]:
| An out of bounds read in the function d2alaw_array() in alaw.c of
| libsndfile 1.0.28 may lead to a remote DoS attack or information
| disclosure, related to mishandling of the NAN and INFINITY
| floating-point values.
CVE-2017-14246[1]:
| An out of bounds read in the function d2ulaw_array() in ulaw.c of
| libsndfile 1.0.28 may lead to a remote DoS attack or information
| disclosure, related to mishandling of the NAN and INFINITY
| floating-point values.
If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2017-14245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14245
[1] https://security-tracker.debian.org/tracker/CVE-2017-14246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14246
Please adjust the affected versions in the BTS as needed.
Regards,
Markus
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 963 bytes
Desc: OpenPGP digital signature
URL: <http://lists.alioth.debian.org/pipermail/pkg-multimedia-maintainers/attachments/20170924/63cbcf55/attachment.sig>
More information about the pkg-multimedia-maintainers
mailing list