An issue was discovered in SoX 14.4.2. One of the arguments to bitrv2 in fft4g.c is not guarded, such that it can lead to write access outside of the statically declared array, aka a stack-based buffer overflow.
References
Link | Resource |
---|---|
https://lists.debian.org/debian-lts-announce/2019/05/msg00040.html | |
https://sourceforge.net/p/sox/bugs/321 | Exploit Third Party Advisory |
https://usn.ubuntu.com/4079-1/ | |
https://usn.ubuntu.com/4079-2/ |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-02-15T23:00:00
Updated: 2019-08-02T02:06:05
Reserved: 2019-02-15T00:00:00
Link: CVE-2019-8356
JSON object: View
NVD Information
Status : Modified
Published: 2019-02-15T23:29:00.370
Modified: 2020-08-24T17:37:01.140
Link: CVE-2019-8356
JSON object: View
Redhat Information
No data.