{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-4156","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","dateUpdated":"2025-12-11T12:06:14.134Z","dateReserved":"2021-12-22T00:00:00.000Z","datePublished":"2022-03-23T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2023-09-29T12:06:18.959Z"},"descriptions":[{"lang":"en","value":"An out-of-bounds read flaw was found in libsndfile's FLAC codec functionality. An attacker who is able to submit a specially crafted file (via tricking a user to open or otherwise) to an application linked with libsndfile and using the FLAC codec, could trigger an out-of-bounds read that would most likely cause a crash but could potentially leak memory information that could be used in further exploitation of other flaws."}],"affected":[{"vendor":"n/a","product":"libsndfile","versions":[{"version":"libsndfile 1.1.0","status":"affected"}]}],"references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2027690"},{"url":"https://github.com/libsndfile/libsndfile/pull/732/commits/4c30646abf7834e406f7e2429c70bc254e18beab"},{"url":"https://github.com/libsndfile/libsndfile/issues/731"},{"name":"[debian-lts-announce] 20220628 [SECURITY] [DLA 3058-1] libsndfile security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2022/06/msg00020.html"},{"name":"[debian-lts-announce] 20220929 [SECURITY] [DLA 3126-1] libsndfile security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00036.html"},{"name":"GLSA-202309-11","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202309-11"}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-125","cweId":"CWE-125"}]}]},"adp":[{"title":"CVE Program Container","references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2027690","tags":["x_transferred"]},{"url":"https://github.com/libsndfile/libsndfile/pull/732/commits/4c30646abf7834e406f7e2429c70bc254e18beab","tags":["x_transferred"]},{"url":"https://github.com/libsndfile/libsndfile/issues/731","tags":["x_transferred"]},{"name":"[debian-lts-announce] 20220628 [SECURITY] [DLA 3058-1] libsndfile security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2022/06/msg00020.html"},{"name":"[debian-lts-announce] 20220929 [SECURITY] [DLA 3126-1] libsndfile security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00036.html"},{"name":"GLSA-202309-11","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202309-11"},{"url":"https://lists.debian.org/debian-lts-announce/2025/12/msg00013.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-12-11T12:06:14.134Z"}}]}}