Bug 3982 - libsndfile missing security update for CVE-2011-2696
Summary: libsndfile missing security update for CVE-2011-2696
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 1
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact:
URL:
Whiteboard:
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2012-01-01 04:04 CET by David Walser
Modified: 2012-01-09 15:56 CET (History)
6 users (show)

See Also:
Source RPM: libsndfile-1.0.23-2.mga1.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2012-01-01 04:04:28 CET
Mandriva issued this advisory on July 25:
http://lists.mandriva.com/security-announce/2011-07/msg00008.php

This can be fixed using the patch from MDV or by updating to 1.0.25.
Comment 1 Manuel Hiebel 2012-01-01 12:42:44 CET
Hi, thanks for reporting this bug.
As there is no maintainer for this package I added the committers in CC.

(Please set the status to 'assigned' if you are working on it)

CC: (none) => dmorganec, fundawang, mageia

Comment 2 D Morgan 2012-01-03 01:38:26 CET
pushed on updates_testing

Assignee: bugsquad => qa-bugs

Comment 3 David Walser 2012-01-03 23:32:15 CET
Works for me on i586.  Tested by converting an OGG Vorbis file to WAV using audacity.
Comment 4 David GEIGER 2012-01-09 10:47:34 CET
Testing complete the srpm libsndfile-1.0.23-2.1.mga1.src.rpm on Mageia release 1 (Official) for x86_64 ,works for me too when I convert a OGG file to WAV file with Audacity.

CC: (none) => geiger.david68210

Comment 5 David Walser 2012-01-09 14:56:48 CET
Validating

Advisory:
========================

Updated libsndfile packages fix security vulnerability:

An integer overflow flaw, leading to a heap-based buffer overflow,
was found in the way the libsndfile library processed certain
Ensoniq PARIS Audio Format (PAF) audio files. An attacker could
create a specially-crafted PAF file that, when opened, could cause
an application using libsndfile to crash or, potentially, execute
arbitrary code with the privileges of the user running the application
(CVE-2011-2696).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2696
http://secunia.com/advisories/45125/
http://www.mandriva.com/en/support/security/advisories/?dis=2010.1&name=MDVSA-2011:119
========================

Updated packages in core/updates_testing:
========================
libsndfile-devel-1.0.23-2.1.mga1
libsndfile-progs-1.0.23-2.1.mga1
libsndfile-static-devel-1.0.23-2.1.mga1
libsndfile1-1.0.23-2.1.mga1

from libsndfile-1.0.23-2.1.mga1.src.rpm
========================

Could sysadmin please push from core/updates_testing to core/updates

Thank you!

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs
Hardware: i586 => All

Comment 6 Thomas Backlund 2012-01-09 15:56:49 CET
update pushed

Status: NEW => RESOLVED
CC: (none) => tmb
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.