CVE-2022-33065
Summary
| CVE | CVE-2022-33065 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-07-18 14:15:00 UTC |
| Updated | 2023-08-02 17:19:00 UTC |
| Description | Multiple signed integers overflow in function au_read_header in src/au.c and in functions mat4_open and mat4_read_header in src/mat4.c in Libsndfile, allows an attacker to cause Denial of Service or other unspecified impacts. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Signed integer overflow in src/mat4.c:323 · Issue #789 · libsndfile/libsndfile · GitHub |
MISC |
github.com |
|
| UndefinedBehaviorSanitizer: multiple signed integer overflow · Issue #833 · libsndfile/libsndfile · GitHub |
MISC |
github.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 199890 Ubuntu Security Notification for libsndfile Vulnerability (USN-6471-1)
- 673330 EulerOS Security Update for libsndfile (EulerOS-SA-2024-1063)
- 673469 EulerOS Security Update for libsndfile (EulerOS-SA-2023-3338)
- 673874 EulerOS Security Update for libsndfile (EulerOS-SA-2023-3306)
- 674102 EulerOS Security Update for libsndfile (EulerOS-SA-2024-1087)
- 691352 Free Berkeley Software Distribution (FreeBSD) Security Update for libsndfile_project (4ade0c4d-7e83-11ee-9a8c-00155d01f201)
- 755149 SUSE Enterprise Linux Security Update for libsndfile (SUSE-SU-2023:4331-1)
- 755150 SUSE Enterprise Linux Security Update for libsndfile (SUSE-SU-2023:4330-1)