I m not longer the maintainer of libsndfile.
You can contact the new maintainers at https://github.com/libsndfile/ Erik Moritz Mühlenhoff wrote: > Source: libsndfile > X-Debbugs-CC: t...@security.debian.org > Severity: grave > Tags: security > > Hi, > > The following vulnerability was published for libsndfile. > > CVE-2021-3246[0]: > | A heap buffer overflow vulnerability in msadpcm_decode_block of > | libsndfile 1.0.30 allows attackers to execute arbitrary code via a > | crafted WAV file. > > https://github.com/libsndfile/libsndfile/issues/687 > > Patch is here: > https://github.com/libsndfile/libsndfile/commit/deb669ee8be55a94565f6f8a6b60890c2e7c6f32 > > > If you fix the vulnerability please also make sure to include the > CVE (Common Vulnerabilities & Exposures) id in your changelog entry. > > For further information see: > > [0] https://security-tracker.debian.org/tracker/CVE-2021-3246 > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3246 > > Please adjust the affected versions in the BTS as needed. > -- ---------------------------------------------------------------------- Erik de Castro Lopo http://www.mega-nerd.com/