The TDStretch::acceptNewOverlapLength function in source/SoundTouch/TDStretch.cpp in SoundTouch 1.9.2 allows remote attackers to cause a denial of service (memory allocation error and application crash) via a crafted wav file.
{
"binaries": [
{
"binary_version": "1.7.1-5ubuntu0.1~esm1",
"binary_name": "libsoundtouch-dev"
},
{
"binary_version": "1.7.1-5ubuntu0.1~esm1",
"binary_name": "libsoundtouch0"
},
{
"binary_version": "1.7.1-5ubuntu0.1~esm1",
"binary_name": "soundstretch"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}
{
"binaries": [
{
"binary_version": "1.9.2-2+deb9u1build0.16.04.1",
"binary_name": "libsoundtouch-dev"
},
{
"binary_version": "1.9.2-2+deb9u1build0.16.04.1",
"binary_name": "libsoundtouch1"
},
{
"binary_version": "1.9.2-2+deb9u1build0.16.04.1",
"binary_name": "soundstretch"
}
],
"availability": "No subscription required"
}