SUSE Security Update: Security update for libsndfile
______________________________________________________________________________

Announcement ID:    SUSE-SU-2019:14008-1
Rating:             moderate
References:         #1071767 #1071777 #1117954 
Cross-References:   CVE-2017-17456 CVE-2017-17457 CVE-2018-19758
                   
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11-SP4
                    SUSE Linux Enterprise Server 11-SP4
                    SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________

   An update that fixes three vulnerabilities is now available.

Description:

   This update for libsndfile fixes the following issues:

   Security issues fixed:

   - CVE-2017-17456: Prevent segmentation fault in the function
     d2alaw_array() that may have lead to a remote DoS (bsc#1071777).
   - CVE-2017-17457: Prevent segmentation fault in the function
     d2ulaw_array() that may have lead to a remote DoS, a different
     vulnerability than CVE-2017-14246 (bsc#1071767).
   - CVE-2018-19758: Fixed a heap-based buffer over-read at wav.c in
     wav_write_header that could have been used for a denial of service
     attack (bsc#1117954).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11-SP4:

      zypper in -t patch sdksp4-libsndfile-14008=1

   - SUSE Linux Enterprise Server 11-SP4:

      zypper in -t patch slessp4-libsndfile-14008=1

   - SUSE Linux Enterprise Debuginfo 11-SP4:

      zypper in -t patch dbgsp4-libsndfile-14008=1



Package List:

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      libsndfile-devel-1.0.20-2.19.12.1

   - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      libsndfile-1.0.20-2.19.12.1

   - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):

      libsndfile-32bit-1.0.20-2.19.12.1

   - SUSE Linux Enterprise Server 11-SP4 (ia64):

      libsndfile-x86-1.0.20-2.19.12.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      libsndfile-debuginfo-1.0.20-2.19.12.1
      libsndfile-debugsource-1.0.20-2.19.12.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (ppc64 s390x x86_64):

      libsndfile-debuginfo-32bit-1.0.20-2.19.12.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (ia64):

      libsndfile-debuginfo-x86-1.0.20-2.19.12.1


References:

   https://www.suse.com/security/cve/CVE-2017-17456.html
   https://www.suse.com/security/cve/CVE-2017-17457.html
   https://www.suse.com/security/cve/CVE-2018-19758.html
   https://bugzilla.suse.com/1071767
   https://bugzilla.suse.com/1071777
   https://bugzilla.suse.com/1117954

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2019:14008-1 moderate: libsndfile

April 2, 2019
An update that fixes three vulnerabilities is now available

Summary

This update for libsndfile fixes the following issues: Security issues fixed: - CVE-2017-17456: Prevent segmentation fault in the function d2alaw_array() that may have lead to a remote DoS (bsc#1071777). - CVE-2017-17457: Prevent segmentation fault in the function d2ulaw_array() that may have lead to a remote DoS, a different vulnerability than CVE-2017-14246 (bsc#1071767). - CVE-2018-19758: Fixed a heap-based buffer over-read at wav.c in wav_write_header that could have been used for a denial of service attack (bsc#1117954). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-libsndfile-14008=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-libsndfile-14008=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-libsndfile-14008=1 Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): libsndfile-devel-1.0.20-2.19.12.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): libsndfile-1.0.20-2.19.12.1 - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64): libsndfile-32bit-1.0.20-2.19.12.1 - SUSE Linux Enterprise Server 11-SP4 (ia64): libsndfile-x86-1.0.20-2.19.12.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): libsndfile-debuginfo-1.0.20-2.19.12.1 libsndfile-debugsource-1.0.20-2.19.12.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (ppc64 s390x x86_64): libsndfile-debuginfo-32bit-1.0.20-2.19.12.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (ia64): libsndfile-debuginfo-x86-1.0.20-2.19.12.1

References

#1071767 #1071777 #1117954

Cross- CVE-2017-17456 CVE-2017-17457 CVE-2018-19758

Affected Products:

SUSE Linux Enterprise Software Development Kit 11-SP4

SUSE Linux Enterprise Server 11-SP4

SUSE Linux Enterprise Debuginfo 11-SP4

https://www.suse.com/security/cve/CVE-2017-17456.html

https://www.suse.com/security/cve/CVE-2017-17457.html

https://www.suse.com/security/cve/CVE-2018-19758.html

https://bugzilla.suse.com/1071767

https://bugzilla.suse.com/1071777

https://bugzilla.suse.com/1117954

Severity
Announcement ID: SUSE-SU-2019:14008-1
Rating: moderate

Related News