MGASA-2015-0408

Source
https://advisories.mageia.org/MGASA-2015-0408.html
Import Source
https://advisories.mageia.org/MGASA-2015-0408.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0408
Related
Published
2015-10-25T14:38:05Z
Modified
2015-10-25T14:34:25Z
Summary
Updated audiofile packages fixes security vulnerability
Details

When libaudiofile is used to change both the number of channels of an audio file (e.g. from stereo to mono) and the sample format (e.g. from 16-bit samples to 8-bit samples), the output file will contain corrupted data. If the new sample format is smaller than the old one, there is a risk of buffer overflow: e.g. when the input file has 16-bit samples and the output file has 8-bit samples, afReadFrames will treat the buffer to read the samples (argument void *data) as a pointer to int16t instead of int8t, therefore it will write past its end (CVE-2015-7747).

References
Credits

Affected packages

Mageia:5 / audiofile

Package

Name
audiofile
Purl
pkg:rpm/mageia/audiofile?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.3.6-4.1.mga5

Ecosystem specific

{
    "section": "core"
}