An updated lib32-libvorbis package has been released for Arch Linux
Arch Linux Security Advisory ASA-201803-21
==========================================
Severity: Critical
Date : 2018-03-19
CVE-ID : CVE-2017-14632 CVE-2017-14633 CVE-2018-5146
Package : lib32-libvorbis
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-658
Summary
=======
The package lib32-libvorbis before version 1.3.6-1 is vulnerable to
multiple issues including arbitrary code execution and denial of
service.
Resolution
==========
Upgrade to 1.3.6-1.
# pacman -Syu "lib32-libvorbis>=1.3.6-1"
The problems have been fixed upstream in version 1.3.6.
Workaround
==========
None.
Description
===========
- CVE-2017-14632 (arbitrary code execution)
fXiph.Org libvorbis before 1.3.6 allows remote code execution upon
freeing uninitialized memory in the function
vorbis_analysis_headerout() in info.c when vi->channels