{"id":"MGASA-2018-0019","summary":"Updated mad packages fix security vulnerability","details":"The mad_layer_III function in layer3.c in Underbit MAD libmad 0.15.1b\nallows remote attackers to cause a denial of service (heap-based buffer\noverflow and application crash) or possibly have unspecified other impact\nvia a crafted audio file (CVE-2017-8373).\n\nThe mad_bit_skip function in bit.c in Underbit MAD libmad 0.15.1b allows\nremote attackers to cause a denial of service (heap-based buffer over-read\nand application crash) via a crafted audio file (CVE-2017-8374).\n","modified":"2026-02-04T03:50:03.841666Z","published":"2018-01-02T15:02:16Z","related":["CVE-2017-8373","CVE-2017-8374"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2018-0019.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=20773"},{"type":"REPORT","url":"http://openwall.com/lists/oss-security/2017/05/01/8"},{"type":"REPORT","url":"http://openwall.com/lists/oss-security/2017/05/01/9"},{"type":"REPORT","url":"https://security-tracker.debian.org/tracker/CVE-2017-8373"},{"type":"REPORT","url":"https://security-tracker.debian.org/tracker/CVE-2017-8374"}],"affected":[{"package":{"name":"mad","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/mad?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.15.1b-17.4.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2018-0019.json"}},{"package":{"name":"mad","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/mad?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.15.1b-22.1.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2018-0019.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}