logo
DATABASE RESOURCES PRICING ABOUT US

Security update for libsndfile (critical)

Description

An update that fixes four vulnerabilities is now available. Description: This update for libsndfile fixes the following issues: - CVE-2018-13139: Fixed a stack-based buffer overflow in psf_memset in common.c in libsndfile 1.0.28allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact. (bsc#1100167) - CVE-2018-19432: Fixed a NULL pointer dereference in the function sf_write_int in sndfile.c, which will lead to a denial of service. (bsc#1116993) - CVE-2021-3246: Fixed a heap buffer overflow vulnerability in msadpcm_decode_block. (bsc#1188540) - CVE-2018-19758: Fixed a heap-based buffer over-read at wav.c in wav_write_header in libsndfile 1.0.28 that will cause a denial of service. (bsc#1117954) This update was imported from the SUSE:SLE-15:Update update project. Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2021-1166=1


Affected Package


OS OS Version Package Name Package Version
openSUSE Leap 15.2 - openSUSE Leap 15.2 (i586 x86_64):
openSUSE Leap 15.2 - openSUSE Leap 15.2 (i586 x86_64):
openSUSE Leap 15.2 - openSUSE Leap 15.2 (x86_64):

Related