The TDStretch::processSamples function in source/SoundTouch/TDStretch.cpp in SoundTouch 1.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted wav file.
{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "libsoundtouch-dev",
"binary_version": "1.7.1-5ubuntu0.1~esm1"
},
{
"binary_name": "libsoundtouch0",
"binary_version": "1.7.1-5ubuntu0.1~esm1"
},
{
"binary_name": "soundstretch",
"binary_version": "1.7.1-5ubuntu0.1~esm1"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "libsoundtouch-dev",
"binary_version": "1.9.2-2+deb9u1build0.16.04.1"
},
{
"binary_name": "libsoundtouch1",
"binary_version": "1.9.2-2+deb9u1build0.16.04.1"
},
{
"binary_name": "soundstretch",
"binary_version": "1.9.2-2+deb9u1build0.16.04.1"
}
]
}