Back to bug 2091798

Who When What Removed Added
Sandipan Roy 2022-05-31 05:46:31 UTC CC felix, hhorak, hobbes1069, jmoskovc
Sandipan Roy 2022-05-31 05:55:44 UTC Blocks 2091808
Sandipan Roy 2022-06-08 07:59:21 UTC Depends On 2094687, 2094686, 2094688
Product Security DevOps Team 2022-06-08 09:20:31 UTC Resolution --- WONTFIX
Status NEW CLOSED
Last Closed 2022-06-08 09:20:31 UTC
Sandipan Roy 2022-07-01 06:02:34 UTC Doc Text A heap-based buffer overflow vulnerability exists in the sphere.c start_read() functionality of Sound Exchange sox. A specially-crafted file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
Sandipan Roy 2022-07-01 06:05:23 UTC Doc Text A heap-based buffer overflow vulnerability exists in the sphere.c start_read() functionality of Sound Exchange sox. A specially-crafted file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. A heap-based buffer overflow vulnerability exists in the sphere.c start_read() functionality of Sound Exchange sox library. A specially-crafted file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
RaTasha Tillery-Smith 2022-07-01 12:05:08 UTC Doc Text A heap-based buffer overflow vulnerability exists in the sphere.c start_read() functionality of Sound Exchange sox library. A specially-crafted file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. A heap-based buffer overflow vulnerability exists in the sphere.c start_read() functionality of Sound Exchange sox library. A specially-crafted file can lead to a heap buffer overflow. This flaw allows an attacker to provide a malicious file to trigger this vulnerability.
RaTasha Tillery-Smith 2022-07-01 12:07:22 UTC Doc Text A heap-based buffer overflow vulnerability exists in the sphere.c start_read() functionality of Sound Exchange sox library. A specially-crafted file can lead to a heap buffer overflow. This flaw allows an attacker to provide a malicious file to trigger this vulnerability. A heap-based buffer overflow vulnerability exists in the sphere.c start_read() functionality of the Sound Exchange sox library. A specially-crafted file can lead to a heap buffer overflow. This flaw allows an attacker to provide a malicious file to trigger this vulnerability.

Back to bug 2091798