Bug 1440758 (CVE-2017-7586) - CVE-2017-7586 libsndfile: Error in header_read() causing stack-based buffer overflow
Summary: CVE-2017-7586 libsndfile: Error in header_read() causing stack-based buffer o...
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2017-7586
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1440760
Blocks: 1440764
TreeView+ depends on / blocked
 
Reported: 2017-04-10 12:34 UTC by Adam Mariš
Modified: 2019-09-29 14:09 UTC (History)
4 users (show)

Fixed In Version: libsndfile 1.0.28
Clone Of:
Environment:
Last Closed: 2017-04-11 10:30:04 UTC
Embargoed:


Attachments (Terms of Use)

Description Adam Mariš 2017-04-10 12:34:37 UTC
In libsndfile before 1.0.28, an error in the "header_read()" function (common.c) when handling ID3 tags can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.

Upstream patch:

https://github.com/erikd/libsndfile/commit/f457b7b5ecfe91697ed01cfc825772c4d8de1236
https://github.com/erikd/libsndfile/commit/708e996c87c5fae77b104ccfeb8f6db784c32074

Upstream news:

http://www.mega-nerd.com/libsndfile/NEWS

Comment 1 Adam Mariš 2017-04-10 12:37:45 UTC
Created libsndfile tracking bugs for this issue:

Affects: fedora-all [bug 1440760]


Note You need to log in before you can comment on or make changes to this bug.