SB2018082015 - OpenSUSE Linux update for aubio



SB2018082015 - OpenSUSE Linux update for aubio

Published: August 20, 2018 Updated: August 20, 2018

Security Bulletin ID SB2018082015
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Improper input validation (CVE-ID: CVE-2018-14522)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists due to an error when processing malicious input. A remote attacker can trick the victim into processing specially crafted data, trigger SEGV signal can occur in aubio_pitch_set_unit in pitch/pitch.c, as demonstrated by aubionotes and cause the service to crash.


2) Buffer overread (CVE-ID: CVE-2018-14523)

The vulnerability allows a remote attacker to obtain potentially sensitive information or cause DoS condition on the target system.

The vulnerability exists due to an error when processing malicious input. A remote attacker can trick the victim into processing specially crafted data, trigger buffer over-read in new_aubio_pitchyinfft in pitch/pitchyinfft.c, as demonstrated by aubionotesa and obtain potentially sensitive information or cause the service to crash.


Remediation

Install update from vendor's website.