logo
DATABASE RESOURCES PRICING ABOUT US

libsndfile - security update

Description

* [CVE-2017-8361](https://security-tracker.debian.org/tracker/CVE-2017-8361) The flac\_buffer\_copy function in flac.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted audio file. * [CVE-2017-8362](https://security-tracker.debian.org/tracker/CVE-2017-8362) The flac\_buffer\_copy function in flac.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted audio file. * [CVE-2017-8363](https://security-tracker.debian.org/tracker/CVE-2017-8363) The flac\_buffer\_copy function in flac.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted audio file. * [CVE-2017-8365](https://security-tracker.debian.org/tracker/CVE-2017-8365) The i2les\_array function in pcm.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted audio file. For Debian 7 Wheezy, these problems have been fixed in version 1.0.25-9.1+deb7u2. We recommend that you upgrade your libsndfile packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: <https://wiki.debian.org/LTS>


Affected Software


CPE Name Name Version
libsndfile 1.0.25-7
libsndfile 1.0.25-6
libsndfile 1.0.25-9
libsndfile 1.0.25-9.1
libsndfile 1.0.25-8
libsndfile 1.0.25-5
libsndfile 1.0.25-9.1+deb7u1

Related