Back to bug 2024253
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Guilherme de Almeida Suckevicz | 2021-11-17 17:00:28 UTC | Depends On | 2024254, 2024255 | |
| Guilherme de Almeida Suckevicz | 2021-11-17 17:01:21 UTC | Blocks | 2024256 | |
| RaTasha Tillery-Smith | 2021-11-29 15:47:59 UTC | Depends On | 2026255, 2026253, 2026256 | |
| Doc Text | A stack-based buffer overflow flaw was found in speex. Specifically within read_samples() at src/speexenc.c. This flaw could allow a malicious user to provide a crafted wav file to the speexenc utility and in some cases could possibly lead to arbitrary | |||
| Doc Text | code execution. | |||
| Doc Text | A stack-based buffer overflow flaw was found in speex. Specifically within read_samples() at src/speexenc.c. This flaw could allow a malicious user to provide a crafted wav file to the speexenc utility and in some cases could possibly lead to arbitrary code execution. | A stack-based buffer overflow flaw was found in speex within the read_samples() at src/speexenc.c function. This flaw allows a malicious user to provide a crafted wav file to the speexenc utility, and in some cases, possibly lead to arbitrary code execution. The highest threat from this vulnerability is to system availability. | ||
| Red Hat Bugzilla | 2023-07-07 08:34:19 UTC | Assignee | security-response-team | nobody |
Back to bug 2024253