Back to bug 2024253

Who When What Removed Added
Guilherme de Almeida Suckevicz 2021-11-17 17:00:28 UTC Depends On 2024254, 2024255
Guilherme de Almeida Suckevicz 2021-11-17 17:01:21 UTC Blocks 2024256
RaTasha Tillery-Smith 2021-11-29 15:47:59 UTC Depends On 2026255, 2026253, 2026256
Doc Text A stack-based buffer overflow flaw was found in speex. Specifically within read_samples() at src/speexenc.c. This flaw could allow a malicious user to provide a crafted wav file to the speexenc utility and in some cases could possibly lead to arbitrary
Doc Text code execution.
Doc Text A stack-based buffer overflow flaw was found in speex. Specifically within read_samples() at src/speexenc.c. This flaw could allow a malicious user to provide a crafted wav file to the speexenc utility and in some cases could possibly lead to arbitrary code execution. A stack-based buffer overflow flaw was found in speex within the read_samples() at src/speexenc.c function. This flaw allows a malicious user to provide a crafted wav file to the speexenc utility, and in some cases, possibly lead to arbitrary code execution. The highest threat from this vulnerability is to system availability.
Red Hat Bugzilla 2023-07-07 08:34:19 UTC Assignee security-response-team nobody

Back to bug 2024253