ALT-PU-2018-2324-1
Package libsndfile updated to version 1.0.28-alt1.M80P.1 for branch p8 in task 212938.
Closed vulnerabilities
BDU:2018-00012
Уязвимость функции aiff_read_chanmap (aaiff.c) библиотеки libsndfile, позволяющая нарушителю нарушить конфиденциальность, целостность и доступность данных
BDU:2018-00013
Уязвимость функции psf_binheader_writef (common.c) библиотеки libsndfile операционной системы Astra Linux, позволяющая нарушителю нарушить конфиденциальность, целостность и доступность данных или вызвать отказ в обслуживании
Modified: 2025-04-20
CVE-2017-12562
Heap-based Buffer Overflow in the psf_binheader_writef function in common.c in libsndfile through 1.0.28 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
- https://github.com/erikd/libsndfile/issues/292
- https://lists.debian.org/debian-lts-announce/2022/06/msg00020.html
- https://security.gentoo.org/glsa/201811-23
- https://github.com/erikd/libsndfile/issues/292
- https://lists.debian.org/debian-lts-announce/2022/06/msg00020.html
- https://security.gentoo.org/glsa/201811-23
Modified: 2025-04-20
CVE-2017-6892
In libsndfile version 1.0.28, an error in the "aiff_read_chanmap()" function (aiff.c) can be exploited to cause an out-of-bounds read memory access via a specially crafted AIFF file.
- https://github.com/erikd/libsndfile/commit/f833c53cb596e9e1792949f762e0b33661822748
- https://lists.debian.org/debian-lts-announce/2020/10/msg00030.html
- https://secuniaresearch.flexerasoftware.com/advisories/76717/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2017-13/
- https://security.gentoo.org/glsa/201811-23
- https://usn.ubuntu.com/4013-1/
- https://github.com/erikd/libsndfile/commit/f833c53cb596e9e1792949f762e0b33661822748
- https://lists.debian.org/debian-lts-announce/2020/10/msg00030.html
- https://secuniaresearch.flexerasoftware.com/advisories/76717/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2017-13/
- https://security.gentoo.org/glsa/201811-23
- https://usn.ubuntu.com/4013-1/
Modified: 2025-04-20
CVE-2017-7585
In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.
- http://www.mega-nerd.com/libsndfile/#History
- http://www.mega-nerd.com/libsndfile/NEWS
- https://github.com/erikd/libsndfile/commit/60b234301adf258786d8b90be5c1d437fc8799e0
- https://secuniaresearch.flexerasoftware.com/secunia_research/2017-4/
- https://security.gentoo.org/glsa/201707-04
- http://www.mega-nerd.com/libsndfile/#History
- http://www.mega-nerd.com/libsndfile/NEWS
- https://github.com/erikd/libsndfile/commit/60b234301adf258786d8b90be5c1d437fc8799e0
- https://secuniaresearch.flexerasoftware.com/secunia_research/2017-4/
- https://security.gentoo.org/glsa/201707-04
Modified: 2025-04-20
CVE-2017-7586
In libsndfile before 1.0.28, an error in the "header_read()" function (common.c) when handling ID3 tags can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.
- http://www.mega-nerd.com/libsndfile/#History
- http://www.mega-nerd.com/libsndfile/NEWS
- http://www.securityfocus.com/bid/97522
- https://github.com/erikd/libsndfile/commit/708e996c87c5fae77b104ccfeb8f6db784c32074
- https://github.com/erikd/libsndfile/commit/f457b7b5ecfe91697ed01cfc825772c4d8de1236
- https://security.gentoo.org/glsa/201707-04
- http://www.mega-nerd.com/libsndfile/#History
- http://www.mega-nerd.com/libsndfile/NEWS
- http://www.securityfocus.com/bid/97522
- https://github.com/erikd/libsndfile/commit/708e996c87c5fae77b104ccfeb8f6db784c32074
- https://github.com/erikd/libsndfile/commit/f457b7b5ecfe91697ed01cfc825772c4d8de1236
- https://security.gentoo.org/glsa/201707-04
Modified: 2025-04-20
CVE-2017-7741
In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a segmentation violation (with write memory access) via a specially crafted FLAC file during a resample attempt, a similar issue to CVE-2017-7585.
- https://blogs.gentoo.org/ago/2017/04/11/libsndfile-invalid-memory-read-and-invalid-memory-write-in/
- https://github.com/erikd/libsndfile/commit/60b234301adf258786d8b90be5c1d437fc8799e0
- https://security.gentoo.org/glsa/201707-04
- https://blogs.gentoo.org/ago/2017/04/11/libsndfile-invalid-memory-read-and-invalid-memory-write-in/
- https://github.com/erikd/libsndfile/commit/60b234301adf258786d8b90be5c1d437fc8799e0
- https://security.gentoo.org/glsa/201707-04
Modified: 2025-04-20
CVE-2017-7742
In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a segmentation violation (with read memory access) via a specially crafted FLAC file during a resample attempt, a similar issue to CVE-2017-7585.
- https://blogs.gentoo.org/ago/2017/04/11/libsndfile-invalid-memory-read-and-invalid-memory-write-in/
- https://github.com/erikd/libsndfile/commit/60b234301adf258786d8b90be5c1d437fc8799e0
- https://security.gentoo.org/glsa/201707-04
- https://blogs.gentoo.org/ago/2017/04/11/libsndfile-invalid-memory-read-and-invalid-memory-write-in/
- https://github.com/erikd/libsndfile/commit/60b234301adf258786d8b90be5c1d437fc8799e0
- https://security.gentoo.org/glsa/201707-04