Buffer Overflow vulnerability in function bitwriter_grow_ in flac before 1.4.0 allows remote attackers to run arbitrary code via crafted input to the encoder. https://github.com/xiph/flac/issues/215
Created flac tracking bugs for this issue: Affects: fedora-all [bug 2235580]
As the current maintainer of FLAC, I'm a little puzzled I haven't been contacted about this. I would really like to know what has happened here, because this bug can only be triggered by supplying invalid data to the libFLAC. I agree that libFLAC should not show this behaviour, which is why it was fixed. However, this problem is not exploitable through most tools, like the flac command line tool. So, I'd really like to know which tool can be used to supply this invalid data? I can't really seem to find the connection between libeconf and libFLAC?
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2023:5042 https://access.redhat.com/errata/RHSA-2023:5042
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions Red Hat Enterprise Linux 8.2 Telecommunications Update Service Via RHSA-2023:5043 https://access.redhat.com/errata/RHSA-2023:5043
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2023:5044 https://access.redhat.com/errata/RHSA-2023:5044
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:5047 https://access.redhat.com/errata/RHSA-2023:5047
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:5045 https://access.redhat.com/errata/RHSA-2023:5045
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:5046 https://access.redhat.com/errata/RHSA-2023:5046
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:5048 https://access.redhat.com/errata/RHSA-2023:5048
(Sorry, I accidentally modified this bug - reverting...)