An issue in phiola/src/afilter/pcm_convert.h:513 of phiola v2.0-rc22 allows a remote attacker to execute arbitrary code via the a crafted .wav file.
github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/poc/I2ZFI3~5
github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/segmentFault-1.assets/image-20240420011601263.png
github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/segmentFault-1.md
github.com/Helson-S/FuzzyTesting/tree/master/phiola/segmentFault-1
github.com/Helson-S/FuzzyTesting/tree/master/phiola/segmentFault-1/poc
github.com/stsaz/phiola/
github.com/stsaz/phiola/issues/28