| Summary: | libao new security issue CVE-2017-11548 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | anssi.hannula, ghibomgx, herman.viaene, lewyssmith, marja11, olav, sysadmin-bugs |
| Version: | 6 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA6-32-OK | ||
| Source RPM: | libao-1.2.2-3.mga6.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2018-08-06 22:13:21 CEST
Assigning to all packagers collectively, since there is no registered maintainer for this package. CC'ing some committers. CC:
(none) =>
anssi.hannula, ghibomgx, marja11, olav Upstream patch added to libao-1.2.2-5.mga7 to fix this in Cauldron. Version:
Cauldron =>
6 Advisory: ======================== Updated libao packages fix security vulnerability: A flaw was found in libao. The _tokenize_matrix function in audio_out.c in Xiph.Org libao 1.2.0 can cause a denial of service(memory corruption) via a crafted mp3 file (CVE-2017-11548). References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11548 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/LIZBEBMU7CW7K7KQ53E4OPSRTR6DZRNO/ ======================== Updated packages in core/updates_testing: ======================== libao4-1.2.2-3.1.mga6 libao-devel-1.2.2-3.1.mga6 from libao-1.2.2-3.1.mga6.src.rpm Assignee:
pkg-bugs =>
qa-bugs MGA6-32 on IBM Thinkpad R50e No installation issues No previous update bug found, so used # urpmq --whatrequires libao4 and found a.o. cmus as dependent on it. Installed cmus and (after googling how to run it) $ strace -o libao.txt cmus played a wav file in cmus and found refs to libao n the trace file. OK for me. Whiteboard:
(none) =>
MGA6-32-OK
Lewis Smith
2019-01-06 10:20:28 CET
Keywords:
(none) =>
advisory, validated_update An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2019-0018.html Status:
NEW =>
RESOLVED |