libsndfile: Arbitrary code execution An integer overflow in libsndfile might allow remote attackers to execute arbitrary code or cause a Denial of Service condition. libsndfile 2013-12-17 2013-12-17 375125 remote 1.0.25 1.0.25

Libsndfile is a C library for reading and writing files containing sampled sound through one standard library interface.

An integer overflow flaw has been discovered in Libsndfile.

A remote attacker could entice a user to open a specially crafted PAF file using libsndfile, possibly resulting in execution of arbitrary code with the privileges of the process, or a Denial of Service condition.

There is no known workaround at this time.

All libsndfile users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/libsndfile-1.0.25"

Packages which depend on this library may need to be recompiled. Tools such as revdep-rebuild may assist in identifying some of these packages.

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since September 12, 2011. It is likely that your system is already no longer affected by this issue.

CVE-2011-2696 underling Zlogene