From ${URL} : A buffer overread was found in libsndfile by me, in the latest version. Fix commit here: https://github.com/erikd/libsndfile/commit/dbe14f00030af5d3577f4cabbf9861db59e9c378 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
CVE-2014-9496 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9496): The sd2_parse_rsrc_fork function in sd2.c in libsndfile allows attackers to have unspecified impact via vectors related to a (1) map offset or (2) rsrc marker, which triggers an out-of-bounds read.
commit 6f4d6d4e5f9402581ccb90dcba045a509b03a99a Author: Justin Lecher <jlec@gentoo.org> Date: Tue Jan 26 09:51:14 2016 +0100 media-libs/libsndfile: Drop version vulnerable for CVE-2015-7805 Package-Manager: portage-2.2.27 Signed-off-by: Justin Lecher <jlec@gentoo.org> https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=6f4d6d4e5f9402581ccb90dcba045a509b03a99a
@sec, clean again
@ Security: Waiting for GLSA...
This issue was resolved and addressed in GLSA 201612-03 at https://security.gentoo.org/glsa/201612-03 by GLSA coordinator Aaron Bauman (b-man).