Source: libsndfile
Version: 1.0.25-9.1+deb7u3
Severity: important

Hi,
Looking at

     https://security-tracker.debian.org/tracker/TEMP-0000000-1EDB2D

(temporary ID, will change iff a CVE gets assigned) libsndfile has
several heap buffer overflows affecting all versions so filing a bug to
track this.
Cheers,
 -- Guido
   

-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable-debug'), (500, 
'testing-debug'), (500, 'oldoldstable'), (500, 'unstable'), (500, 'stable'), 
(1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.11.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Reply via email to