Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#8173 - Buffer overflow security bug in libsndfile 1.0.17
Attached to Project:
Arch Linux
Opened by Hussam Al-Tayeb (hussam) - Sunday, 30 September 2007, 08:35 GMT
Last edited by Tobias Powalowski (tpowa) - Sunday, 30 September 2007, 11:07 GMT
Opened by Hussam Al-Tayeb (hussam) - Sunday, 30 September 2007, 08:35 GMT
Last edited by Tobias Powalowski (tpowa) - Sunday, 30 September 2007, 11:07 GMT
|
DetailsThe following link http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4974 describes a security bug in current version of libsndfile
I'll attach the gentoo fix. |
This task depends upon
Comment by Hussam Al-Tayeb (hussam) -
Sunday, 30 September 2007, 08:36 GMT
Attached the gentoo fix.
libsndfile-1.0.17-flac-buffer...
(1.5 KiB)