[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 867-1] audiofile security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Package        : audiofile
Version        : 0.3.4-2+deb7u1
CVE ID         : CVE-2017-6829 CVE-2017-6830 CVE-2017-6831 CVE-2017-6832 
                 CVE-2017-6833 CVE-2017-6834 CVE-2017-6835 CVE-2017-6836 
                 CVE-2017-6837 CVE-2017-6838 CVE-2017-6839
Debian Bug     : 857651


Multiple vulnerabilities has been found in audiofile.

CVE-2017-6829

    Allows remote attackers to cause a denial of service (crash) via a
    crafted file.

CVE-2017-6830, CVE-2017-6834, CVE-2017-6831, CVE-2017-6832, CVE-2017-6838,
CVE-2017-6839, CVE-2017-6836

    Heap-based buffer overflow in that allows remote attackers to cause
    a denial of service (crash) via a crafted file.

CVE-2017-6833, CVE-2017-6835

    The runPull function allows remote attackers to cause a denial of
    service (divide-by-zero error and crash) via a crafted file.

CVE-2017-6837

    Allows remote attackers to cause a denial of service (crash) via
    vectors related to a large number of coefficients.

For Debian 7 "Wheezy", these problems have been fixed in version
0.3.4-2+deb7u1.

We recommend that you upgrade your audiofile packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -- 
 -------------- Ola Lundqvist --------------------
/  opal@debian.org       GPG fingerprint          \
|  ola@inguza.com        22F2 32C6 B1E0 F4BF 2B26 |
|  http://inguza.com/    0A6A 5E90 DCFA 9426 876F /
 -------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=LYNV
-----END PGP SIGNATURE-----


Reply to: