MuseScore CAP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MuseScore. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CAP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20769. https://www.zerodayinitiative.com/advisories/ZDI-23-1526/
Created edwin-fonts tracking bugs for this issue: Affects: fedora-all [bug 2279222] Created leland-fonts tracking bugs for this issue: Affects: fedora-all [bug 2279223] Created mscore tracking bugs for this issue: Affects: fedora-all [bug 2279224] Created musescore tracking bugs for this issue: Affects: fedora-all [bug 2279221]
There was no point in opening those font package bugs, since font packages contain no code. This bug doesn't give any useful information about the purported bug. What source files contain the bug? Is there a known fix? What versions are affected? Is 3.x affected? If not, then we don't need the mscore bug. Is 4.2.x affected? If not, then we don't need the musescore bug. I am happy to update or fix the affected packages, but I need *some* information to work with.
Hello? Is anybody home?