Bug 1440758 (CVE-2017-7586)
Summary: | CVE-2017-7586 libsndfile: Error in header_read() causing stack-based buffer overflow | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | andreas, dkholia, mhlavink, slawomir |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | libsndfile 1.0.28 | Doc Type: | If docs needed, set a value |
Doc Text: |
A buffer overflow flaw was found in the way libsndfile handled ID3 tags. This flaw could potentially be used to crash the application using libsndfile by tricking the application into processing specially crafted FLAC files.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2017-04-11 10:30:04 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1440760 | ||
Bug Blocks: | 1440764 |
Description
Adam Mariš
2017-04-10 12:34:37 UTC
Created libsndfile tracking bugs for this issue: Affects: fedora-all [bug 1440760] |