{"id":"USN-3306-1","summary":"libsndfile vulnerabilities","details":"Agostino Sarubbo and Jakub Jirasek discovered that libsndfile incorrectly\nhandled certain malformed files. A remote attacker could use this issue to\ncause libsndfile to crash, resulting in a denial of service, or possibly\nexecute arbitrary code.\n","modified":"2026-04-22T09:35:07.309508Z","published":"2017-06-01T13:56:45Z","related":["UBUNTU-CVE-2017-7585","UBUNTU-CVE-2017-7586","UBUNTU-CVE-2017-7741","UBUNTU-CVE-2017-7742","UBUNTU-CVE-2017-8361","UBUNTU-CVE-2017-8362","UBUNTU-CVE-2017-8363","UBUNTU-CVE-2017-8365"],"upstream":["CVE-2017-7585","CVE-2017-7586","CVE-2017-7741","CVE-2017-7742","CVE-2017-8361","CVE-2017-8362","CVE-2017-8363","CVE-2017-8365","UBUNTU-CVE-2017-7585","UBUNTU-CVE-2017-7586","UBUNTU-CVE-2017-7741","UBUNTU-CVE-2017-7742","UBUNTU-CVE-2017-8361","UBUNTU-CVE-2017-8362","UBUNTU-CVE-2017-8363","UBUNTU-CVE-2017-8365"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3306-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7585"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7586"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7741"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7742"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-8361"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-8362"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-8363"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-8365"}],"affected":[{"package":{"name":"libsndfile","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/libsndfile@1.0.25-7ubuntu2.2?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.25-7ubuntu2.2"}]}],"versions":["1.0.25-7ubuntu1","1.0.25-7ubuntu2","1.0.25-7ubuntu2.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libsndfile1","binary_version":"1.0.25-7ubuntu2.2"},{"binary_name":"sndfile-programs","binary_version":"1.0.25-7ubuntu2.2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3306-1.json","cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-7585"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-7586"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-7741"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-7742"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-8361"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-8362"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-8363"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-8365"}]}}},{"package":{"name":"libsndfile","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/libsndfile@1.0.25-10ubuntu0.16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.25-10ubuntu0.16.04.1"}]}],"versions":["1.0.25-9.1","1.0.25-10"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libsndfile1","binary_version":"1.0.25-10ubuntu0.16.04.1"},{"binary_name":"sndfile-programs","binary_version":"1.0.25-10ubuntu0.16.04.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3306-1.json","cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-7585"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-7586"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-7741"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-7742"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-8361"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-8362"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-8363"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-8365"}]}}}],"schema_version":"1.7.5"}