Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in wavpack
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in wavpack
ID: FEDORA-2017-9d7f592a03
Distribution: Fedora
Plattformen: Fedora 24
Datum: So, 5. Februar 2017, 11:24
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10169
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10172
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10171
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10170

Originalnachricht

Name        : wavpack
Product : Fedora 24
Version : 5.1.0
Release : 1.fc24
URL : http://www.wavpack.com/
Summary : A completely open audiocodec
Description :
WavPack is a completely open audio compression format providing lossless,
high-quality lossy, and a unique hybrid compression mode. Although the
technology is loosely based on previous versions of WavPack, the new
version 4 format has been designed from the ground up to offer unparalleled
performance and functionality.

-------------------------------------------------------------------------------
-
Update Information:

Update wavpack to 5.1.0
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1417853 - CVE-2016-10172 wavpack: Heap out of bounds read in
read_new_config_info / open_utils.c
https://bugzilla.redhat.com/show_bug.cgi?id=1417853
[ 2 ] Bug #1417852 - CVE-2016-10171 wavpack: Heap out of bounds read in
unreorder_channels / wvunpack.c
https://bugzilla.redhat.com/show_bug.cgi?id=1417852
[ 3 ] Bug #1417851 - CVE-2016-10170 wavpack: Heap out of bounds read in
WriteCaffHeader / caff.c
https://bugzilla.redhat.com/show_bug.cgi?id=1417851
[ 4 ] Bug #1417850 - CVE-2016-10169 wavpack: Global buffer overread in
read_code / read_words.c
https://bugzilla.redhat.com/show_bug.cgi?id=1417850
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade wavpack' at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung