Change log for libsndfile package in Ubuntu

175 of 87 results
Published in oracular-release
Published in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
libsndfile (1.2.2-1ubuntu5) noble; urgency=medium

  * Rebuild against new libmpg123t64.

 -- Gianfranco Costamagna <email address hidden>  Fri, 05 Apr 2024 08:20:20 +0200

Available diffs

Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
libsndfile (1.2.2-1ubuntu4) noble; urgency=medium

  * No-change rebuild for CVE-2024-3094

 -- Steve Langasek <email address hidden>  Sun, 31 Mar 2024 07:58:58 +0000

Available diffs

Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
libsndfile (1.2.2-1ubuntu3) noble; urgency=medium

  * No-change rebuild against libflac12t64

 -- Steve Langasek <email address hidden>  Mon, 11 Mar 2024 14:55:05 +0000

Available diffs

Deleted in noble-updates (Reason: superseded by release)
Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
libsndfile (1.2.2-1ubuntu2) noble; urgency=medium

  * Rebuild against armhf \-fstack-clash-protection breakage rebuild
    with fixed dpkg.

 -- Gianfranco Costamagna <email address hidden>  Thu, 23 Nov 2023 17:57:03 +0100
Superseded in noble-proposed
libsndfile (1.2.2-1ubuntu1) noble; urgency=medium

  * SECURITY UPDATE: integer overflow vulnerability
    - debian/patches/CVE-2022-33065/CVE-2022-33065-*.patch: fix various
      numeric overflow vulnerabilities.
    - CVE-2022-33065

 -- Fabian Toepfer <email address hidden>  Thu, 02 Nov 2023 16:34:14 +0100
Published in focal-updates
Published in focal-security
libsndfile (1.0.28-7ubuntu0.2) focal-security; urgency=medium

  * SECURITY UPDATE: integer overflow vulnerability
    - debian/patches/CVE-2022-33065/CVE-2022-33065-*.patch: fix various
      numeric overflow vulnerabilities.
    - CVE-2022-33065

 -- Fabian Toepfer <email address hidden>  Thu, 02 Nov 2023 16:47:21 +0100
Published in jammy-updates
Published in jammy-security
libsndfile (1.0.31-2ubuntu0.1) jammy-security; urgency=medium

  * SECURITY UPDATE: integer overflow vulnerability
    - debian/patches/CVE-2022-33065/CVE-2022-33065-*.patch: fix various
      numeric overflow vulnerabilities.
    - CVE-2022-33065

 -- Fabian Toepfer <email address hidden>  Thu, 02 Nov 2023 16:42:46 +0100
Published in mantic-updates
Published in mantic-security
libsndfile (1.2.2-1ubuntu0.23.10.1) mantic-security; urgency=medium

  * SECURITY UPDATE: integer overflow vulnerability
    - debian/patches/CVE-2022-33065/CVE-2022-33065-*.patch: fix various
      numeric overflow vulnerabilities.
    - CVE-2022-33065

 -- Fabian Toepfer <email address hidden>  Thu, 02 Nov 2023 16:34:14 +0100
Published in lunar-updates
Published in lunar-security
libsndfile (1.2.0-1ubuntu0.1) lunar-security; urgency=medium

  * SECURITY UPDATE: integer overflow vulnerability
    - debian/patches/CVE-2022-33065/CVE-2022-33065-*.patch: fix various
      numeric overflow vulnerabilities.
    - CVE-2022-33065

 -- Fabian Toepfer <email address hidden>  Wed, 01 Nov 2023 16:55:33 +0100
Superseded in noble-release
Published in mantic-release
Deleted in mantic-proposed (Reason: Moved to mantic)
libsndfile (1.2.2-1) unstable; urgency=medium

  [ Dennis Braun ]
  * New upstream version 1.2.2

  [ IOhannes m zmölnig (Debian/GNU) ]
  * Remove remaining build artifacts on 'clean' (Closes: #1046007)

 -- IOhannes m zmölnig (Debian/GNU) <email address hidden>  Wed, 30 Aug 2023 14:34:05 +0200

Available diffs

Superseded in mantic-release
Published in lunar-release
Deleted in lunar-proposed (Reason: Moved to lunar)
libsndfile (1.2.0-1) unstable; urgency=medium

  * Team upload
  * New upstream version 1.2.0
  * Bump Standards-Version to 4.6.2
  * Refresh patchset, drop patches applied by upstream

 -- Dennis Braun <email address hidden>  Sat, 31 Dec 2022 15:51:23 +0100
Superseded in lunar-release
Deleted in lunar-proposed (Reason: Moved to lunar)
libsndfile (1.1.0-3build1) lunar; urgency=medium

  * No-change rebuild against libflac12

 -- Steve Langasek <email address hidden>  Mon, 12 Dec 2022 20:27:41 +0000
Superseded in lunar-release
Deleted in lunar-proposed (Reason: Moved to lunar)
libsndfile (1.1.0-3) unstable; urgency=medium

  * Add patch to fix clipping of non-int32 numbers
  * Mark patches as applied upstream
  * Fix typo in d/changelog

 -- IOhannes m zmölnig (Debian/GNU) <email address hidden>  Thu, 06 Oct 2022 10:47:11 +0200
Superseded in lunar-release
Obsolete in kinetic-release
Published in jammy-release
Deleted in jammy-proposed (Reason: Moved to jammy)
libsndfile (1.0.31-2build1) jammy; urgency=high

  * No change rebuild for ppc64el baseline bump.

 -- Julian Andres Klode <email address hidden>  Thu, 24 Mar 2022 17:13:47 +0100
Obsolete in hirsute-updates
Obsolete in hirsute-security
libsndfile (1.0.31-1ubuntu1.1) hirsute-security; urgency=medium

  * SECURITY UPDATE: heap buffer overflow in msadpcm_decode_block allows
    arbitrary code execution via crafted WAV file.
    - debian/patches/CVE-2021-3246.patch: upstream patch to src/ms_adpcm.c
      to validate samples per block
    - CVE-2021-3246

 -- Alex Murray <email address hidden>  Tue, 27 Jul 2021 16:22:54 +0930
Superseded in focal-updates
Superseded in focal-security
libsndfile (1.0.28-7ubuntu0.1) focal-security; urgency=medium

  * SECURITY UPDATE: heap buffer overflow in msadpcm_decode_block allows
    arbitrary code execution via crafted WAV file.
    - debian/patches/CVE-2021-3246.patch: upstream patch to src/ms_adpcm.c
      to validate samples per block
    - CVE-2021-3246

 -- Alex Murray <email address hidden>  Wed, 28 Jul 2021 10:22:09 +0930
Published in bionic-updates
Published in bionic-security
libsndfile (1.0.28-4ubuntu0.18.04.2) bionic-security; urgency=medium

  * SECURITY UPDATE: heap buffer overflow in msadpcm_decode_block allows
    arbitrary code execution via crafted WAV file.
    - debian/patches/CVE-2021-3246.patch: upstream patch to src/ms_adpcm.c
      to validate samples per block
    - CVE-2021-3246

 -- Alex Murray <email address hidden>  Wed, 28 Jul 2021 10:22:45 +0930
Superseded in impish-release
Deleted in impish-proposed (Reason: Moved to impish)
libsndfile (1.0.31-1ubuntu2) impish; urgency=medium

  * SECURITY UPDATE: heap buffer overflow in msadpcm_decode_block allows
    arbitrary code execution via crafted WAV file.
    - debian/patches/CVE-2021-3246.patch: upstream patch to src/ms_adpcm.c
      to validate samples per block
    - CVE-2021-3246

 -- Alex Murray <email address hidden>  Mon, 26 Jul 2021 17:02:42 +0930
Superseded in jammy-release
Obsolete in impish-release
Deleted in impish-proposed (Reason: Moved to impish)
libsndfile (1.0.31-2) unstable; urgency=medium

  * Team upload

  [ IOhannes m zmölnig (Debian/GNU) ]
  * Fix FTBFS with DEB_BUILD_OPTIONS=nocheck.
    Thanks to Helmut Grohne <email address hidden> (Closes: #984746)

  [ Sebastian Ramacher ]
  * debian/patches: Apply upstream fix for CVE-2021-3246 (Closes: #991496)

 -- Sebastian Ramacher <email address hidden>  Mon, 26 Jul 2021 23:09:17 +0200
Superseded in impish-release
Obsolete in hirsute-release
Deleted in hirsute-proposed (Reason: moved to Release)
libsndfile (1.0.31-1ubuntu1) hirsute; urgency=medium

  * debian/rules: forcefully enable tests (they are disabled by default on
    riscv64 in Ubuntu) because libsndfile1-dev wants to install test binaries
    (LP: #1917650)

 -- Olivier Tilloy <email address hidden>  Wed, 03 Mar 2021 17:53:18 +0100
Superseded in hirsute-proposed
libsndfile (1.0.31-1) unstable; urgency=medium

  * New upstream version 1.0.31
    * (LP: #1807823, #1807825, #1807826, #900332, #999994)
    * (LP: #1036831, #1546685)
    * Refresh patches
  * Register documentation as markdown (aka: text) rather than html

 -- IOhannes m zmölnig (Debian/GNU) <email address hidden>  Fri, 29 Jan 2021 23:05:07 +0100

Available diffs

Published in xenial-updates
Published in xenial-security
libsndfile (1.0.25-10ubuntu0.16.04.3) xenial-security; urgency=medium

  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/CVE-2017-12562.patch: Size buffer correctly in
      src/common.c to prevent buffer overflows.
    - CVE-2017-12562

 -- Avital Ostromich <email address hidden>  Thu, 14 Jan 2021 19:46:45 -0500
Superseded in hirsute-proposed
libsndfile (1.0.30-1) unstable; urgency=medium

  * New upstream version 1.0.30
    * Drop patches applied upstream
    * Refresh patches
    * Fix more typos
  * Re-arranged B-Ds alphabetically
  * B-D on autogen, python3 & libopus-dev
  * Have libsndfile-dev depend on libopus-dev
  * Run upstream testsuite as autopkgtest
    * Include test-suite in libsndfile1-dev
  * Fix false-positive of salsa-pipeline "blhc"
  * Update d/copyright to handle filerenames
  * Updated d/watch to point to github
  * Bump standards version to 4.5.1

 -- IOhannes m zmölnig (Debian/GNU) <email address hidden>  Mon, 11 Jan 2021 16:24:15 +0100
Superseded in hirsute-release
Obsolete in groovy-release
Deleted in groovy-proposed (Reason: moved to Release)
libsndfile (1.0.28-8) unstable; urgency=medium

  * Team upload.

  [ Simon McVittie ]
  * examples: Decouple from config.h.
    This allows them to be built standalone, without the rest of the
    libsndfile source tree. This is useful because config.h is
    architecture-dependent, preventing multi-arch co-installation.
  * Mark libsndfile1-dev as Multi-Arch: same.  (Closes: #960445; LP: #1720725)
  * Add a superficial compile/link/execute autopkgtest for libsndfile1-dev.

  [ Mattia Rizzolo ]
  * d/control: Bump debhelper compat level to 13.
    + Add the .la file to d/not-installed.
  * d/rules: Remove now obsolete --dbgsym-migration option.

 -- Mattia Rizzolo <email address hidden>  Mon, 25 May 2020 17:33:03 +0200

Available diffs

Superseded in groovy-release
Published in focal-release
Deleted in focal-proposed (Reason: moved to Release)
libsndfile (1.0.28-7) unstable; urgency=medium

  [ Ondřej Nový ]
  * Use debhelper-compat instead of debian/compat

  [ Debian Janitor ]
  * Set upstream metadata fields:
    Bug-Database, Repository, Repository-Browse, Bug-Submit.

  [ IOhannes m zmölnig (Debian/GNU) ]
  * Add salsa-ci configuration
  * Bump standards version to 4.5.0

 -- IOhannes m zmölnig (Debian/GNU) <email address hidden>  Tue, 18 Feb 2020 10:59:43 +0100

Available diffs

Superseded in xenial-updates
Superseded in xenial-security
libsndfile (1.0.25-10ubuntu0.16.04.2) xenial-security; urgency=medium

  * SECURITY UPDATE: multiple security issues
    - debian/patches/*.patch: sync multiple security patches with 1.0.28-6.
    - CVE-2017-6892, CVE-2017-14245, CVE-2017-14246, CVE-2017-14634,
      CVE-2017-16942, CVE-2017-17456, CVE-2017-17457, CVE-2018-13139,
      CVE-2018-19432, CVE-2018-19661, CVE-2018-19662, CVE-2018-19758,
      CVE-2019-3832

 -- Marc Deslauriers <email address hidden>  Fri, 07 Jun 2019 14:35:20 -0400
Superseded in bionic-updates
Superseded in bionic-security
libsndfile (1.0.28-4ubuntu0.18.04.1) bionic-security; urgency=medium

  * SECURITY UPDATE: multiple security issues
    - debian/patches/*.patch: sync multiple security patches with 1.0.28-6.
    - CVE-2017-14245, CVE-2017-14246, CVE-2017-14634, CVE-2017-17456,
      CVE-2017-17457, CVE-2018-13139, CVE-2018-19432, CVE-2018-19661,
      CVE-2018-19662, CVE-2018-19758, CVE-2019-3832

 -- Marc Deslauriers <email address hidden>  Fri, 07 Jun 2019 14:06:41 -0400
Obsolete in cosmic-updates
Obsolete in cosmic-security
libsndfile (1.0.28-4ubuntu0.18.10.1) cosmic-security; urgency=medium

  * SECURITY UPDATE: multiple security issues
    - debian/patches/*.patch: sync multiple security patches with 1.0.28-6.
    - CVE-2017-14245, CVE-2017-14246, CVE-2017-14634, CVE-2017-17456,
      CVE-2017-17457, CVE-2018-13139, CVE-2018-19432, CVE-2018-19661,
      CVE-2018-19662, CVE-2018-19758, CVE-2019-3832

 -- Marc Deslauriers <email address hidden>  Fri, 07 Jun 2019 14:06:41 -0400
Superseded in focal-release
Obsolete in eoan-release
Obsolete in disco-release
Deleted in disco-proposed (Reason: moved to release)
libsndfile (1.0.28-6) unstable; urgency=medium

  * Backported fix for out-of-bound reading (CVE-2019-3832) (Closes: #922372)

 -- IOhannes m zmölnig (Debian/GNU) <email address hidden>  Fri, 08 Mar 2019 20:35:07 +0100

Available diffs

Superseded in disco-release
Deleted in disco-proposed (Reason: moved to release)
libsndfile (1.0.28-5) unstable; urgency=medium

  [ Ondřej Nový ]
  * d/control: Set Vcs-* to salsa.debian.org
  * d/changelog: Remove trailing whitespaces

  [ Felipe Sateler ]
  * Change maintainer address to <email address hidden>

  [ IOhannes m zmölnig (Debian/GNU) ]
  * Normalize patches with 'gbp pq'
  * Add patch to fix buffer overflows in alaw/ulaw code
    (CVE-2018-19661, CVE-2018-19662, CVE-2017-17456 and CVE-2017-17457).
    Thanks to Hugo Lefeuvre <email address hidden> (Closes: #884735)
  * Patch to fix division by zero (CVE-2017-14634)
    Thanks to Fabian Greffrath <email address hidden> (Closes: #876783)
  * Patch to fix heap read overflow (CVE-2018-19758)
    Thanks to Erik de Castro Lopo <email address hidden> (Closes: #917416)
  * Patch to ensure that maxnum channels is not exceeded.
    Thanks to Brett T. Warden <email address hidden>
  * Declare that "root" is not required to build this package
  * Removed whitespace at end of d/changelog
  * Bumped dh compat to 12
  * Bump standards version to 4.3.0

 -- IOhannes m zmölnig (Debian/GNU) <email address hidden>  Tue, 12 Feb 2019 15:59:58 +0100

Available diffs

Superseded in disco-release
Obsolete in cosmic-release
Published in bionic-release
Obsolete in artful-release
Deleted in artful-proposed (Reason: moved to release)
libsndfile (1.0.28-4) unstable; urgency=medium

  * Moved maintainance to pkg-multimedia team
  * Made examples buildable (and build reproducible)
  * Dropped doubly installed docs
  * Dropped B-D on autotools-dev
  * Bumped standards version to 4.0.1

 -- IOhannes m zmölnig (Debian/GNU) <email address hidden>  Thu, 17 Aug 2017 14:21:33 +0200

Available diffs

Superseded in artful-release
Deleted in artful-proposed (Reason: moved to release)
libsndfile (1.0.28-3) unstable; urgency=medium

  * Backported heap-overflow fix from upstream.

 -- IOhannes m zmölnig (Debian/GNU) <email address hidden>  Wed, 12 Jul 2017 23:22:54 +0200

Available diffs

Superseded in artful-release
Deleted in artful-proposed (Reason: moved to release)
libsndfile (1.0.28-2) unstable; urgency=medium

  * Backported fixes for RF64 support on armel/armhf (Closes: #865344)

 -- IOhannes m zmölnig (Debian/GNU) <email address hidden>  Tue, 20 Jun 2017 21:35:50 +0200

Available diffs

Superseded in artful-proposed
libsndfile (1.0.28-1) unstable; urgency=medium

  * New upstream version 1.0.28

  * d/patches/
    * Removed patches applied upstream
    * Refreshed patches
    * Backported patch for fixing CVE-2017-6892
      (Closes: #864704)
    * Fixed more typos
  * d/control: single line per Depends
  * Switched packaging to shorthand dh
    * Build automatic debug packages
    * Dropped setting of DEB_*_GNU_TYPE and friends
  * Raised debhelper compat to 10
    * Dropped B-D on dh-autoreconf
    * B-D on autotools-dev
  * Use DEP5 for d/copyright
  * Bumped standards version to 4.0.0
  * 

 -- IOhannes m zmölnig (Debian/GNU) <email address hidden>  Tue, 20 Jun 2017 15:03:55 +0200

Available diffs

Published in trusty-updates
Published in trusty-security
libsndfile (1.0.25-7ubuntu2.2) trusty-security; urgency=medium

  * SECURITY UPDATE: multiple security issues
    - debian/patches/*: synchronize security fixes with Debian's
      1.0.25-9.1+deb7u2 release. Thanks!
    - CVE-2017-7585, CVE-2017-7586, CVE-2017-7741, CVE-2017-7742,
      CVE-2017-8361, CVE-2017-8362, CVE-2017-8363, CVE-2017-8365

 -- Marc Deslauriers <email address hidden>  Wed, 31 May 2017 09:42:28 -0400
Superseded in xenial-updates
Superseded in xenial-security
libsndfile (1.0.25-10ubuntu0.16.04.1) xenial-security; urgency=medium

  * SECURITY UPDATE: multiple security issues
    - debian/patches/*: synchronize security fixes with Debian's
      1.0.25-9.1+deb7u2 release. Thanks!
    - CVE-2017-7585, CVE-2017-7586, CVE-2017-7741, CVE-2017-7742,
      CVE-2017-8361, CVE-2017-8362, CVE-2017-8363, CVE-2017-8365

 -- Marc Deslauriers <email address hidden>  Wed, 31 May 2017 09:38:37 -0400
Obsolete in yakkety-updates
Obsolete in yakkety-security
libsndfile (1.0.25-10ubuntu0.16.10.1) yakkety-security; urgency=medium

  * SECURITY UPDATE: multiple security issues
    - debian/patches/*: synchronize security fixes with Debian's
      1.0.25-9.1+deb7u2 release. Thanks!
    - CVE-2017-7585, CVE-2017-7586, CVE-2017-7741, CVE-2017-7742,
      CVE-2017-8361, CVE-2017-8362, CVE-2017-8363, CVE-2017-8365

 -- Marc Deslauriers <email address hidden>  Wed, 31 May 2017 09:38:37 -0400
Obsolete in zesty-updates
Obsolete in zesty-security
libsndfile (1.0.27-1ubuntu0.1) zesty-security; urgency=medium

  * SECURITY UPDATE: multiple security issues
    - debian/patches/*: synchronize security fixes with Debian's 1.0.27-3
      release. Thanks!
    - CVE-2017-7585, CVE-2017-7586, CVE-2017-7741, CVE-2017-7742,
      CVE-2017-8361, CVE-2017-8362, CVE-2017-8363, CVE-2017-8365

 -- Marc Deslauriers <email address hidden>  Wed, 31 May 2017 09:27:40 -0400
Superseded in artful-release
Deleted in artful-proposed (Reason: moved to release)
libsndfile (1.0.27-3) unstable; urgency=medium

  * Mentioned CVEs fixed by fix_bufferoverflows.patch
    (CVE-2017-7741, CVE-2017-7586, CVE-2017-7585)
  * Backported patch for error handling of malicious/broken FLAC files
    (CVE-2017-7742, CVE-2017-7741, CVE-2017-7585)
    (Closes: #860255)
  * Backported patch to fix buffer read overflow in FLAC code
    (CVE-2017-8362)
    (Closes: #862204)
  * Backported patches to fix memory leaks in FLAC code
    (CVE-2017-8363)
    (Closes: #862203)
  * Backported patch to fix buffer overruns in FLAC-code
    (CVE-2017-8365, CVE-2017-8363, CVE-2017-8361)
    (Closes: #862205, #862203, #862202)

  * Added Vcs-* stanzas to d/control

 -- IOhannes m zmölnig (Debian/GNU) <email address hidden>  Sun, 28 May 2017 22:52:39 +0200

Available diffs

Superseded in artful-release
Deleted in artful-proposed (Reason: moved to release)
libsndfile (1.0.27-2) unstable; urgency=medium

  * Backported fixes for buffer-write overflows from 1.0.28.
    Thanks to Erik de Castro Lopo
  * Added myself to uploaders

 -- IOhannes m zmölnig (Debian/GNU) <email address hidden>  Tue, 04 Apr 2017 15:33:45 +0200

Available diffs

Superseded in artful-release
Obsolete in zesty-release
Deleted in zesty-proposed (Reason: moved to release)
libsndfile (1.0.27-1) unstable; urgency=low

  [ Erik de Castro Lopo ]
  * debian/patches : Drop un-needed patches.
  * debian/control : Standards version 3.9.8.
  * debian/copyright : Fix typo.
  * libsndfile1.symbols : Add new symbols.
  * Drop man pages that are now in upstream package.

  [ IOhannes m zmölnig ]
  * debian/patches :
    - Fix spelling errors.
  * debian/rules :
    - Drop deprecated inclusion of hardening-includes.
    - Disable silent builds.

 -- Erik de Castro Lopo <email address hidden>  Wed,  5 Oct 2016 22:32:40 +0200

Available diffs

Obsolete in vivid-updates
Obsolete in vivid-security
libsndfile (1.0.25-9.1ubuntu0.15.04.1) vivid-security; urgency=medium

  * SECURITY UPDATE: denial of service via division-by-zero
    - debian/patches/CVE-2014-9756.patch: check bytes and items in
      src/file_io.c.
    - CVE-2014-9756
  * SECURITY UPDATE: heap overflow via AIFF file headindex value
    - debian/patches/CVE-2015-7805.patch: use headend in src/common.c.
    - CVE-2015-7805

 -- Marc Deslauriers <email address hidden>  Mon, 07 Dec 2015 10:00:33 -0500
Published in precise-updates
Published in precise-security
libsndfile (1.0.25-4ubuntu0.1) precise-security; urgency=medium

  * SECURITY UPDATE: denial of service via segfault in SD2 RSRC parser
    - debian/patches/01_sd2_rsrc_segfault.diff: check bounds in src/sd2.c.
  * SECURITY UPDATE: denial of service via out-of-bounds read
    - debian/patches/CVE-2014-9496.patch: check map offset and rsrc marker
      in src/sd2.c.
    - CVE-2014-9496
  * SECURITY UPDATE: denial of service via division-by-zero
    - debian/patches/CVE-2014-9756.patch: check bytes and items in
      src/file_io.c.
    - CVE-2014-9756
  * SECURITY UPDATE: heap overflow via AIFF file headindex value
    - debian/patches/CVE-2015-7805.patch: use headend in src/common.c.
    - CVE-2015-7805

 -- Marc Deslauriers <email address hidden>  Mon, 07 Dec 2015 10:06:39 -0500
Obsolete in wily-updates
Obsolete in wily-security
libsndfile (1.0.25-9.1ubuntu0.15.10.1) wily-security; urgency=medium

  * SECURITY UPDATE: denial of service via division-by-zero
    - debian/patches/CVE-2014-9756.patch: check bytes and items in
      src/file_io.c.
    - CVE-2014-9756
  * SECURITY UPDATE: heap overflow via AIFF file headindex value
    - debian/patches/CVE-2015-7805.patch: use headend in src/common.c.
    - CVE-2015-7805

 -- Marc Deslauriers <email address hidden>  Mon, 07 Dec 2015 09:53:13 -0500
Superseded in trusty-updates
Superseded in trusty-security
libsndfile (1.0.25-7ubuntu2.1) trusty-security; urgency=medium

  * SECURITY UPDATE: denial of service via out-of-bounds read
    - debian/patches/CVE-2014-9496.patch: check map offset and rsrc marker
      in src/sd2.c.
    - CVE-2014-9496
  * SECURITY UPDATE: denial of service via division-by-zero
    - debian/patches/CVE-2014-9756.patch: check bytes and items in
      src/file_io.c.
    - CVE-2014-9756
  * SECURITY UPDATE: heap overflow via AIFF file headindex value
    - debian/patches/CVE-2015-7805.patch: use headend in src/common.c.
    - CVE-2015-7805

 -- Marc Deslauriers <email address hidden>  Mon, 07 Dec 2015 10:01:39 -0500
Superseded in zesty-release
Obsolete in yakkety-release
Published in xenial-release
Deleted in xenial-proposed (Reason: moved to release)
libsndfile (1.0.25-10) unstable; urgency=low

  * debian/patches :
    - Add 02_sd2_buffer_read_overflow.diff (CVE-2014-9496, closes: #774162).
    - Add 03_file_io_divide_by_zero.diff (CVE-2014-9756, closes: #804447).
    - Add 04_fix_aiff_heap_overflow.diff (CVE-2015-7805, closes: #804445).
  * debian/control: Standards version 3.9.6. No changes needed.

 -- Erik de Castro Lopo <email address hidden>  Tue, 10 Nov 2015 20:36:47 +1100

Available diffs

Superseded in xenial-release
Obsolete in wily-release
Obsolete in vivid-release
Deleted in vivid-proposed (Reason: moved to release)
libsndfile (1.0.25-9.1) unstable; urgency=high


  * Non-maintainer upload by the Security Team.
  * Fix CVE-2014-9496: buffer overread issues (closes: #774162).

 -- Michael Gilbert <email address hidden>  Mon, 26 Jan 2015 01:32:01 +0000

Available diffs

Superseded in vivid-release
Obsolete in utopic-release
Deleted in utopic-proposed (Reason: moved to release)
libsndfile (1.0.25-9) unstable; urgency=low


  * debian/rules: Switch from autotools-dev to dh-autoreconf.
  * debian/control Standards-Version 3.9.5.

 -- Erik de Castro Lopo <email address hidden>  Wed, 29 Jan 2014 18:21:13 +1100
Superseded in utopic-release
Published in trusty-release
Deleted in trusty-proposed (Reason: moved to release)
libsndfile (1.0.25-7ubuntu2) trusty; urgency=medium

  * Build with dh-autoreconf for new libtool.
 -- William Grant <email address hidden>   Sun, 15 Dec 2013 06:30:11 +0000

Available diffs

Superseded in trusty-release
Obsolete in saucy-release
Deleted in saucy-proposed (Reason: moved to release)
libsndfile (1.0.25-7ubuntu1) saucy; urgency=low

  * Update config.{guess,sub} for AArch64.
 -- Matthias Klose <email address hidden>   Tue, 13 Aug 2013 14:11:45 +0200
Superseded in saucy-release
Deleted in saucy-proposed (Reason: moved to release)
libsndfile (1.0.25-7) unstable; urgency=low


  * debian/control debian/rules
    Create -dbg versions of libsndfile1 and sndfile-programs binary packages.

 -- Erik de Castro Lopo <email address hidden>  Sat, 13 Jul 2013 18:48:35 +1000

Available diffs

Superseded in saucy-release
Deleted in saucy-proposed (Reason: moved to release)
libsndfile (1.0.25-6) unstable; urgency=low


  * debian/patches/01_sd2_rsrc_segfault.diff : Patch from upstream git.
  * debian/rules : Remove cruft at end of ifeq line.
  * debian/control : Remove DM-Upload-Allowed which no longer works.

 -- Erik de Castro Lopo <email address hidden>  Fri, 28 Jun 2013 17:39:23 +1000

Available diffs

Superseded in saucy-release
Obsolete in raring-release
Obsolete in quantal-release
libsndfile (1.0.25-5) unstable; urgency=low


  * debian/libsndfile1-dev: Do not install libsndfile.la (Closes: #670420).
  * debian/control: Standards version 3.9.3. No changes needed.

 -- Erik de Castro Lopo <email address hidden>  Mon, 18 Jun 2012 19:22:57 +1000

Available diffs

Superseded in quantal-release
Published in precise-release
libsndfile (1.0.25-4) unstable; urgency=low


  * Patch from Moritz Muehlenhoff enabling harden build flags (Closes: #654831).

 -- Erik de Castro Lopo <email address hidden>  Fri,  6 Jan 2012 21:19:17 +1100

Available diffs

Superseded in precise-release
libsndfile (1.0.25-3) unstable; urgency=low


  * Patch from Steve Langasek to enable multiarch (Closes: #637585).

 -- Erik de Castro Lopo <email address hidden>  Sat, 13 Aug 2011 09:01:35 +1000
Superseded in precise-release
Obsolete in oneiric-release
libsndfile (1.0.24-1ubuntu2) oneiric; urgency=low

  * Build for multiarch.  LP: #825342.
 -- Steve Langasek <email address hidden>   Fri, 12 Aug 2011 12:39:20 -0700
Obsolete in natty-updates
Obsolete in natty-security
libsndfile (1.0.23-1ubuntu0.1) natty-security; urgency=low

  * SECURITY UPDATE: integer overflow leading to heap-based overflow
    - debian/CVE-2011-2696.patch: verify paf header length and paf channels
    - CVE-2011-2696
 -- Jamie Strandboge <email address hidden>   Thu, 21 Jul 2011 15:32:10 -0500
Obsolete in maverick-updates
Obsolete in maverick-security
libsndfile (1.0.21-2ubuntu0.10.10.1) maverick-security; urgency=low

  * SECURITY UPDATE: integer overflow leading to heap-based overflow
    - debian/CVE-2011-2696.patch: verify paf header length and paf channels
    - CVE-2011-2696
 -- Jamie Strandboge <email address hidden>   Thu, 21 Jul 2011 15:33:45 -0500
Obsolete in lucid-updates
Obsolete in lucid-security
libsndfile (1.0.21-2ubuntu0.10.04.1) lucid-security; urgency=low

  * SECURITY UPDATE: integer overflow leading to heap-based overflow
    - debian/CVE-2011-2696.patch: verify paf header length and paf channels
    - CVE-2011-2696
 -- Jamie Strandboge <email address hidden>   Thu, 21 Jul 2011 15:33:45 -0500
Superseded in oneiric-release
libsndfile (1.0.24-1ubuntu1) oneiric; urgency=low

  * SECURITY UPDATE: integer overflow leading to heap-based overflow
    - debian/CVE-2011-2696.patch: verify paf header length and paf channels.
      This can be dropped with 1.0.25.
    - CVE-2011-2696
 -- Jamie Strandboge <email address hidden>   Thu, 21 Jul 2011 15:29:06 -0500

Available diffs

Superseded in oneiric-release
libsndfile (1.0.24-1) unstable; urgency=low

  * New upstream.
 -- Ubuntu Archive Auto-Sync <email address hidden>   Sat,  30 Apr 2011 13:10:34 +0000

Available diffs

Superseded in oneiric-release
Obsolete in natty-release
libsndfile (1.0.23-1build1) natty; urgency=low

  * No-change upload to reduce shipped changelogs.
 -- Martin Pitt <email address hidden>   Fri, 03 Dec 2010 09:13:26 +0100

Available diffs

Superseded in natty-release
libsndfile (1.0.23-1) unstable; urgency=low

  * New upstream (Closes: #599145, #545257).

Available diffs

Superseded in natty-release
Obsolete in maverick-release
Obsolete in lucid-release
libsndfile (1.0.21-2) unstable; urgency=low

  * Patch configure.ac to generate symbols file for kfreebsd (Closes: 561086).
  * debian/control : Add build-dep on autoconf and automake (for autoreconf).
  * debian/rules : Run autoreconf before configure.

Available diffs

Superseded in lucid-release
libsndfile (1.0.20-3) unstable; urgency=low

  * debian/rules :
    - Man pages belong to sndfile-programs. (Closes: #549972).
    - Make sure that test suite failures are not ignored.

Available diffs

Obsolete in hardy-updates
Obsolete in hardy-security
libsndfile (1.0.17-4ubuntu0.8.04.2) hardy-security; urgency=low

  * SECURITY UPDATE: fix heap overflows when processing crafted VOC and AIFF
    headers
    - debian/patches/security_CVE-2009-1788+1791.dpatch: adjust
      voc_read_header() in voc.c to verify the user controlled size before
      using psf_binheader_readf(). Do the same for aiff_read_header() in
      aiff.c for pstr_len.
    - CVE-2009-1788
    - CVE-2009-1791

 -- Jamie Strandboge <email address hidden>   Wed, 07 Oct 2009 15:46:58 -0500
Obsolete in intrepid-updates
Obsolete in intrepid-security
libsndfile (1.0.17-4ubuntu0.8.10.2) intrepid-security; urgency=low

  * SECURITY UPDATE: fix heap overflows when processing crafted VOC and AIFF
    headers
    - debian/patches/security_CVE-2009-1788+1791.dpatch: adjust
      voc_read_header() in voc.c to verify the user controlled size before
      using psf_binheader_readf(). Do the same for aiff_read_header() in
      aiff.c for pstr_len.
    - CVE-2009-1788
    - CVE-2009-1791

 -- Jamie Strandboge <email address hidden>   Wed, 07 Oct 2009 15:42:23 -0500
Obsolete in jaunty-updates
Obsolete in jaunty-security
libsndfile (1.0.17-4ubuntu1.1) jaunty-security; urgency=low

  * SECURITY UPDATE: fix heap overflows when processing crafted VOC and AIFF
    headers
    - debian/patches/security_CVE-2009-1788+1791.dpatch: adjust
      voc_read_header() in voc.c to verify the user controlled size before
      using psf_binheader_readf(). Do the same for aiff_read_header() in
      aiff.c for pstr_len.
    - CVE-2009-1788
    - CVE-2009-1791

 -- Jamie Strandboge <email address hidden>   Wed, 07 Oct 2009 15:24:35 -0500
Superseded in lucid-release
Obsolete in karmic-release
libsndfile (1.0.20-1ubuntu1) karmic; urgency=low

  * debian/rules: Clear the dependency_libs field in .la files.

 -- Luke Yelavich <email address hidden>   Mon, 03 Aug 2009 18:25:23 +0100

Available diffs

Superseded in karmic-release
libsndfile (1.0.20-1) unstable; urgency=low

  * New upstream release.
  * Fixes potential heap overflows on VOC and AIFF files, closes: #528650.

Available diffs

Superseded in karmic-release
Obsolete in jaunty-release
libsndfile (1.0.17-4ubuntu1) jaunty; urgency=low

  * SECURITY UPDATE: integer overflow via crafted description chunks in CAF
    audio files
    - debian/patches/security_CVE-2009-0186.dpatch: make sure
      desc.channels_per_frame is sane in src/caf.c.
    - CVE-2009-0186

 -- Marc Deslauriers <email address hidden>   Fri, 27 Mar 2009 10:37:32 -0400

Available diffs

Superseded in intrepid-updates
Superseded in intrepid-security
libsndfile (1.0.17-4ubuntu0.8.10.1) intrepid-security; urgency=low

  * SECURITY UPDATE: integer overflow via crafted description chunks in CAF
    audio files
    - debian/patches/security_CVE-2009-0186.dpatch: make sure
      desc.channels_per_frame is sane in src/caf.c.
    - CVE-2009-0186

 -- Marc Deslauriers <email address hidden>   Fri, 27 Mar 2009 10:55:13 -0400
Superseded in hardy-updates
Superseded in hardy-security
libsndfile (1.0.17-4ubuntu0.8.04.1) hardy-security; urgency=low

  * SECURITY UPDATE: integer overflow via crafted description chunks in CAF
    audio files
    - debian/patches/security_CVE-2009-0186.dpatch: make sure
      desc.channels_per_frame is sane in src/caf.c.
    - CVE-2009-0186

 -- Marc Deslauriers <email address hidden>   Fri, 27 Mar 2009 11:04:20 -0400
Obsolete in gutsy-updates
Obsolete in gutsy-security
libsndfile (1.0.17-4ubuntu0.7.10.1) gutsy-security; urgency=low

  * SECURITY UPDATE: integer overflow via crafted description chunks in CAF
    audio files
    - debian/patches/security_CVE-2009-0186.dpatch: make sure
      desc.channels_per_frame is sane in src/caf.c.
    - CVE-2009-0186

 -- Marc Deslauriers <email address hidden>   Fri, 27 Mar 2009 11:06:30 -0400
Obsolete in dapper-updates
Obsolete in dapper-security
libsndfile (1.0.12-3ubuntu1.1) dapper-security; urgency=low

  * SECURITY UPDATE: integer overflow via crafted description chunks in CAF
    audio files
    - src/caf.c: make sure desc.channels_per_frame is sane.
    - http://security.debian.org/pool/updates/main/libs/libsndfile/libsndfile_1.0.17-4+lenny1.diff.gz
    - CVE-2009-0186

 -- Marc Deslauriers <email address hidden>   Fri, 27 Mar 2009 11:10:47 -0400
175 of 87 results