lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1QlMID-0002MP-7p@titan.mandriva.com>
Date: Mon, 25 Jul 2011 16:38:00 +0200
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2011:119 ] libsndfile

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2011:119
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : libsndfile
 Date    : July 25, 2011
 Affected: 2009.0, 2010.1, Corporate 4.0, Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 A vulnerability was discovered and corrected in libsndfile:
 
 An integer overflow flaw, leading to a heap-based buffer overflow,
 was found in the way the libsndfile library processed certain
 Ensoniq PARIS Audio Format (PAF) audio files. An attacker could
 create a specially-crafted PAF file that, when opened, could cause
 an application using libsndfile to crash or, potentially, execute
 arbitrary code with the privileges of the user running the application
 (CVE-2011-2696).
 
 Packages for 2009.0 are provided as of the Extended Maintenance
 Program. Please visit this link to learn more:
 http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490
 
 The updated packages have been patched to correct this issue.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2696
 http://secunia.com/advisories/45125/
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2009.0:
 9383f6bd15e67d66d3319481274f242c  2009.0/i586/libsndfile1-1.0.18-2.pre22.1.4mdv2009.0.i586.rpm
 683841acd0bd1f397a97f7f915922c53  2009.0/i586/libsndfile-devel-1.0.18-2.pre22.1.4mdv2009.0.i586.rpm
 5e13dd7bad7f21406bea942ef09e5747  2009.0/i586/libsndfile-progs-1.0.18-2.pre22.1.4mdv2009.0.i586.rpm
 35e9a17c4d60f91d26280b7777e4c083  2009.0/i586/libsndfile-static-devel-1.0.18-2.pre22.1.4mdv2009.0.i586.rpm 
 9ff14b6a740e38689cf287a8e16a4dae  2009.0/SRPMS/libsndfile-1.0.18-2.pre22.1.4mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 cf2a832f9bfd9859d93195793a5aad10  2009.0/x86_64/lib64sndfile1-1.0.18-2.pre22.1.4mdv2009.0.x86_64.rpm
 8aedf342e07affdad07c15644795713b  2009.0/x86_64/lib64sndfile-devel-1.0.18-2.pre22.1.4mdv2009.0.x86_64.rpm
 a6e1626f7392b9749578eff6e84a274b  2009.0/x86_64/lib64sndfile-static-devel-1.0.18-2.pre22.1.4mdv2009.0.x86_64.rpm
 f68bcf560ba264813eebb8f0ff782baa  2009.0/x86_64/libsndfile-progs-1.0.18-2.pre22.1.4mdv2009.0.x86_64.rpm 
 9ff14b6a740e38689cf287a8e16a4dae  2009.0/SRPMS/libsndfile-1.0.18-2.pre22.1.4mdv2009.0.src.rpm

 Mandriva Linux 2010.1:
 fb657db5943e2dc482f5cfd263066d5e  2010.1/i586/libsndfile1-1.0.21-2.1mdv2010.2.i586.rpm
 1c09960b6a09abb942892e52a3ab29af  2010.1/i586/libsndfile-devel-1.0.21-2.1mdv2010.2.i586.rpm
 f3f41c43d977c6002fce9412ce9cf830  2010.1/i586/libsndfile-progs-1.0.21-2.1mdv2010.2.i586.rpm
 e4fe76880b0a4deabc797a7871806baf  2010.1/i586/libsndfile-static-devel-1.0.21-2.1mdv2010.2.i586.rpm 
 0ead7914eda8fa83bfa99e3e05be29ce  2010.1/SRPMS/libsndfile-1.0.21-2.1mdv2010.2.src.rpm

 Mandriva Linux 2010.1/X86_64:
 05dc31ed72e63ac04fc5d69067369c93  2010.1/x86_64/lib64sndfile1-1.0.21-2.1mdv2010.2.x86_64.rpm
 1dc1ce52163ea91aa5b2ad3635217635  2010.1/x86_64/lib64sndfile-devel-1.0.21-2.1mdv2010.2.x86_64.rpm
 770ce057d9c276f15a10715782355fff  2010.1/x86_64/lib64sndfile-static-devel-1.0.21-2.1mdv2010.2.x86_64.rpm
 bb1039622949ecc92974f9b1ca9a275b  2010.1/x86_64/libsndfile-progs-1.0.21-2.1mdv2010.2.x86_64.rpm 
 0ead7914eda8fa83bfa99e3e05be29ce  2010.1/SRPMS/libsndfile-1.0.21-2.1mdv2010.2.src.rpm

 Corporate 4.0:
 0878ddfb767aaaccbac23948f78ddea1  corporate/4.0/i586/libsndfile1-1.0.11-1.3.20060mlcs4.i586.rpm
 dcf983bfa07ca4f6d4391f80cb645f5e  corporate/4.0/i586/libsndfile1-devel-1.0.11-1.3.20060mlcs4.i586.rpm
 4f99c74a97354beed0443ea11dd1629a  corporate/4.0/i586/libsndfile1-static-devel-1.0.11-1.3.20060mlcs4.i586.rpm
 34fa74c7ea214834e9d0575db01a8f40  corporate/4.0/i586/libsndfile-progs-1.0.11-1.3.20060mlcs4.i586.rpm 
 fa0424c0e169e1614666d7736756b031  corporate/4.0/SRPMS/libsndfile-1.0.11-1.3.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 087a22aa5bc3c5b4ea42d3ee53d047b2  corporate/4.0/x86_64/lib64sndfile1-1.0.11-1.3.20060mlcs4.x86_64.rpm
 4bb229456d4f0c791a7528c9cb49bbb7  corporate/4.0/x86_64/lib64sndfile1-devel-1.0.11-1.3.20060mlcs4.x86_64.rpm
 8871bdf19b7a8a3ab8a7fd567b6e5770  corporate/4.0/x86_64/lib64sndfile1-static-devel-1.0.11-1.3.20060mlcs4.x86_64.rpm
 d203a707cbaba0d40735dfee35f45337  corporate/4.0/x86_64/libsndfile-progs-1.0.11-1.3.20060mlcs4.x86_64.rpm 
 fa0424c0e169e1614666d7736756b031  corporate/4.0/SRPMS/libsndfile-1.0.11-1.3.20060mlcs4.src.rpm

 Mandriva Enterprise Server 5:
 dffc2b02d4a2170064283ab09d22425d  mes5/i586/libsndfile1-1.0.18-2.pre22.1.4mdvmes5.2.i586.rpm
 a1637a2915f1a3d2f0152f008cecfc70  mes5/i586/libsndfile-devel-1.0.18-2.pre22.1.4mdvmes5.2.i586.rpm
 b85d2b9dc8b497da15696f559c14c1c5  mes5/i586/libsndfile-progs-1.0.18-2.pre22.1.4mdvmes5.2.i586.rpm
 b5f58e41a413fd79fe280c59ea35cc3b  mes5/i586/libsndfile-static-devel-1.0.18-2.pre22.1.4mdvmes5.2.i586.rpm 
 ea4edf4a49507b9d52b38ade640afebf  mes5/SRPMS/libsndfile-1.0.18-2.pre22.1.4mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 b41d97a1fffb62568532d19479967616  mes5/x86_64/lib64sndfile1-1.0.18-2.pre22.1.4mdvmes5.2.x86_64.rpm
 336081aa960401cbc63cee0cc9b979c4  mes5/x86_64/lib64sndfile-devel-1.0.18-2.pre22.1.4mdvmes5.2.x86_64.rpm
 5286d2f3580b3e01c554da2fe727a3ee  mes5/x86_64/lib64sndfile-static-devel-1.0.18-2.pre22.1.4mdvmes5.2.x86_64.rpm
 089e4c44779b913bca93b4b3c35ea2ab  mes5/x86_64/libsndfile-progs-1.0.18-2.pre22.1.4mdvmes5.2.x86_64.rpm 
 ea4edf4a49507b9d52b38ade640afebf  mes5/SRPMS/libsndfile-1.0.18-2.pre22.1.4mdvmes5.2.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFOLU+wmqjQ0CJFipgRApqdAKDP+TE3JfCP9LgI5wmZJl+eRMaBOwCgoGF6
aIqvPfLcHXFxS1PD1/x8Zxs=
=nMEX
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ