-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.2573
                        libsndfile security update
                               30 July 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           libsndfile
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-3246  

Reference:         ESB-2021.2570
                   ESB-2021.2546

Original Bulletin: 
   https://www.debian.org/lts/security/2021/dla-2722

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian LTS Advisory DLA-2722-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                    Thorsten Alteholz
July 30, 2021                                 https://wiki.debian.org/LTS
- - -------------------------------------------------------------------------

Package        : libsndfile
Version        : 1.0.27-3+deb9u2
CVE ID         : CVE-2021-3246


An issue has been found in libsndfile, a library for reading/writing audio 
files. A crafted WAV file can trigger a heap buffer overflow and might 
allow exectution of arbitrary code.


For Debian 9 stretch, this problem has been fixed in version
1.0.27-3+deb9u2.

We recommend that you upgrade your libsndfile packages.

For the detailed security status of libsndfile please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libsndfile

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -----BEGIN PGP SIGNATURE-----
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=0a1C
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=wOBl
-----END PGP SIGNATURE-----