~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
PublicDateAtUSN: 2017-03-15
Candidate: CVE-2017-6828
PublicDate: 2017-03-15
References:
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
 https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-readvalue-filehandle-cpp
 http://www.ubuntu.com/usn/usn-3241-1
Description:
 Heap-based buffer overflow in the readValue function in FileHandle.cpp in
 audiofile (aka libaudiofile and Audio File Library) 0.3.6 allows remote
 attackers to have unspecified impact via a crafted WAV file.
Ubuntu-Description:
Notes:
 ratliff> same fix as for CVE-2017-6827 and others
Bugs:
 https://github.com/mpruett/audiofile/issues/31
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
 https://bugs.launchpad.net/ubuntu/+source/audiofile/+bug/1674005
Priority: medium
Discovered-by: Agostino Sarubbo
Assigned-to:

Patches_audiofile:
 upstream: https://github.com/mpruett/audiofile/commit/c48e4c6503f7dabd41f11d4c9c7b7f8960e7f2c0
upstream_audiofile: released (0.3.6-4)
precise_audiofile: released (0.3.3-2ubuntu0.3)
trusty_audiofile: released (0.3.6-2ubuntu0.14.04.2)
vivid/stable-phone-overlay_audiofile: DNE
vivid/ubuntu-core_audiofile: DNE
xenial_audiofile: released (0.3.6-2ubuntu0.16.04.1)
yakkety_audiofile: released (0.3.6-3ubuntu0.1)
devel_audiofile: not-affected (0.3.6-4)