blob: 003dd4d91406565e5632eb01995f3687be9a7a48 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200710-04">
<title>libsndfile: Buffer overflow</title>
A buffer overflow vulnerability has been discovered in libsndfile.
<product type="ebuild">libsndfile</product>
<announced>October 07, 2007</announced>
<revised>October 07, 2007: 01</revised>
<package name="media-libs/libsndfile" auto="yes" arch="*">
<unaffected range="ge">1.0.17-r1</unaffected>
<vulnerable range="lt">1.0.17-r1</vulnerable>
libsndfile is a library for reading and writing various formats of
audio files including WAV and FLAC.
Robert Buchholz of the Gentoo Security team discovered that the
flac_buffer_copy() function does not correctly handle FLAC streams with
variable block sizes which leads to a heap-based buffer overflow
<impact type="normal">
A remote attacker could exploit this vulnerability by enticing a user
to open a specially crafted FLAC file or network stream with an
application using libsndfile. This might lead to the execution of
arbitrary code with privileges of the user playing the file.
There is no known workaround at this time.
All libsndfile users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libsndfile-1.0.17-r1&quot;</code>
<uri link="">CVE-2007-4974</uri>
<metadata tag="requester" timestamp="Sat, 06 Oct 2007 23:14:31 +0000">
<metadata tag="submitter" timestamp="Sun, 07 Oct 2007 18:26:17 +0000">
<metadata tag="bugReady" timestamp="Sun, 07 Oct 2007 19:16:11 +0000">