Bugzilla – Bug 1125802
VUL-1: CVE-2019-8356: sox: stack-based buffer overflow in bitrv2 in fft4g.c
Last modified: 2020-01-16 14:02:33 UTC
rh#1678295 An issue was discovered in SoX 14.4.2. One of the arguments to bitrv2 in fft4g.c is not guarded, such that it can lead to write access outside of the statically declared array, aka a stack-based buffer overflow. References: https://bugzilla.redhat.com/show_bug.cgi?id=1678295 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8356 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-8356.html https://sourceforge.net/p/sox/bugs/321
This is automated batch bugzilla cleanup. The openSUSE 42.3 changed to end-of-life (EOL [1]) status. As such it is no longer maintained, which means that it will not receive any further security or bug fix updates. As a result we are closing this bug. If you can reproduce this bug against a currently maintained version of openSUSE (At this moment openSUSE Leap 15.1, 15.0 and Tumbleweed) please feel free to reopen this bug against that version (!you must update the "Version" component in the bug fields, do not just reopen please), or alternatively create a new ticket. Thank you for reporting this bug and we are sorry it could not be fixed during the lifetime of the release. [1] https://en.opensuse.org/Lifetime
unfixed in 15.0 and later