Opened 10 months ago
Closed 10 months ago
#21443 closed enhancement (fixed)
vorbis-tools-1.4.3
| Reported by: | Bruce Dubbs | Owned by: | Douglas R. Reno |
|---|---|---|---|
| Priority: | normal | Milestone: | 12.4 |
| Component: | BOOK | Version: | git |
| Severity: | normal | Keywords: | |
| Cc: |
Description
New point version.
Change History (6)
comment:1 by , 10 months ago
| Summary: | vorbis-tools=1.4.3 → vorbis-tools-1.4.3 |
|---|
comment:2 by , 10 months ago
| Priority: | normal → elevated |
|---|---|
| Summary: | vorbis-tools-1.4.3 → vorbis-tools=1.4.3 |
comment:3 by , 10 months ago
| Summary: | vorbis-tools=1.4.3 → vorbis-tools-1.4.3 |
|---|
comment:4 by , 10 months ago
| Owner: | changed from to |
|---|---|
| Status: | new → assigned |
comment:5 by , 10 months ago
| Priority: | elevated → normal |
|---|
We already had a fix in the book for the vulnerability in question.
comment:6 by , 10 months ago
| Resolution: | → fixed |
|---|---|
| Status: | assigned → closed |
Note:
See TracTickets
for help on using tickets.

Details on that CVE can be found at https://nvd.nist.gov/vuln/detail/cve-2023-43361 - the description is: "Buffer Overflow vulnerability in Vorbis-tools v.1.4.2 allows a local attacker to execute arbitrary code and cause a denial of service during the conversion of wav files to ogg files."