Bug 2235489 (CVE-2020-22219) - CVE-2020-22219 flac: Remote Code Execution (RCE) via the bitwriter_grow_ function, by supplying crafted input to the encoder
Summary: CVE-2020-22219 flac: Remote Code Execution (RCE) via the bitwriter_grow_ func...
Keywords:
Status: NEW
Alias: CVE-2020-22219
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2235501 2235502 2235503 2235504 2235505 2235506 2235507 2235508 2235509 2235510 2235512 2235513 2235580 2235581 2235582 2235583 2235584 2235585 2235586 2235587 2235588
Blocks: 2235490
TreeView+ depends on / blocked
 
Reported: 2023-08-28 20:58 UTC by Anten Skrabec
Modified: 2023-10-03 12:40 UTC (History)
15 users (show)

Fixed In Version: flac 1.4.2
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the libeconf library. This issue occurs due to a buffer overflow vulnerability in the bitwriter_grow_ function in FLAC that allows remote attackers to run arbitrary code via crafted input to the encoder.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2023:5141 0 None None None 2023-09-13 05:26:58 UTC
Red Hat Product Errata RHBA-2023:5160 0 None None None 2023-09-14 08:11:53 UTC
Red Hat Product Errata RHBA-2023:5161 0 None None None 2023-09-14 08:11:52 UTC
Red Hat Product Errata RHSA-2023:5042 0 None None None 2023-09-11 13:00:59 UTC
Red Hat Product Errata RHSA-2023:5043 0 None None None 2023-09-11 13:01:09 UTC
Red Hat Product Errata RHSA-2023:5044 0 None None None 2023-09-11 13:17:32 UTC
Red Hat Product Errata RHSA-2023:5045 0 None None None 2023-09-11 13:18:10 UTC
Red Hat Product Errata RHSA-2023:5046 0 None None None 2023-09-11 13:18:53 UTC
Red Hat Product Errata RHSA-2023:5047 0 None None None 2023-09-11 13:17:43 UTC
Red Hat Product Errata RHSA-2023:5048 0 None None None 2023-09-11 13:19:10 UTC

Description Anten Skrabec 2023-08-28 20:58:42 UTC
Buffer Overflow vulnerability in function bitwriter_grow_ in flac before 1.4.0 allows remote attackers to run arbitrary code via crafted input to the encoder.

https://github.com/xiph/flac/issues/215

Comment 2 Sandipan Roy 2023-08-29 07:05:27 UTC
Created flac tracking bugs for this issue:

Affects: fedora-all [bug 2235580]

Comment 7 mvanb1 2023-09-09 11:55:59 UTC
As the current maintainer of FLAC, I'm a little puzzled I haven't been contacted about this. I would really like to know what has happened here, because this bug can only be triggered by supplying invalid data to the libFLAC.

I agree that libFLAC should not show this behaviour, which is why it was fixed. However, this problem is not exploitable through most tools, like the flac command line tool. So, I'd really like to know which tool can be used to supply this invalid data? I can't really seem to find the connection between libeconf and libFLAC?

Comment 8 errata-xmlrpc 2023-09-11 13:00:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions

Via RHSA-2023:5042 https://access.redhat.com/errata/RHSA-2023:5042

Comment 9 errata-xmlrpc 2023-09-11 13:01:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support
  Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.2 Telecommunications Update Service

Via RHSA-2023:5043 https://access.redhat.com/errata/RHSA-2023:5043

Comment 10 errata-xmlrpc 2023-09-11 13:17:30 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2023:5044 https://access.redhat.com/errata/RHSA-2023:5044

Comment 11 errata-xmlrpc 2023-09-11 13:17:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2023:5047 https://access.redhat.com/errata/RHSA-2023:5047

Comment 12 errata-xmlrpc 2023-09-11 13:18:09 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:5045 https://access.redhat.com/errata/RHSA-2023:5045

Comment 13 errata-xmlrpc 2023-09-11 13:18:51 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:5046 https://access.redhat.com/errata/RHSA-2023:5046

Comment 14 errata-xmlrpc 2023-09-11 13:19:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:5048 https://access.redhat.com/errata/RHSA-2023:5048

Comment 15 Ondrej Mosnacek 2023-09-19 15:23:48 UTC
(Sorry, I accidentally modified this bug - reverting...)


Note You need to log in before you can comment on or make changes to this bug.