An insufficient input validation flaw was found in the way libvorbis
used to process codec file headers (static mode headers and encoding
books) for the Ogg Vorbis audio file format (Ogg). A remote attacker
could provide a specially-crafted Ogg file, which would lead to
denial of service (memory corruption and application crash) or,
potentially execute arbitrary code with the privileges of the application
using the libvorbis library, when opened by the victim.
Created attachment 356685 [details]
Retrieved via command:
svn diff -r 16180:16182 http://svn.xiph.org/trunk/vorbis/ > libvorbis-CVE-2009-2663.patch
Created attachment 356686 [details]
This issue affects the versions of the libvorbis package, as shipped
with Fedora releases of 10 and 11.
Note: Please ensure to mention CVE identifier in the libvorbis
rpm Changelog, while scheduling Fedora updates.
libvorbis-1.2.0-6.fc10 has been submitted as an update for Fedora 10.
libvorbis-1.2.0-8.fc11 has been submitted as an update for Fedora 11.
Rawhide/F12 Alpha is unaffected (libvorbis-1.2.3 contains the fix).
libvorbis-1.2.0-6.fc10 has been pushed to the Fedora 10 stable repository. If problems still persist, please make note of it in this bug report.
libvorbis-1.2.0-8.fc11 has been pushed to the Fedora 11 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products:
Red Hat Enterprise Linux 3
Red Hat Enterprise Linux 4
Red Hat Enterprise Linux 5
Via RHSA-2009:1219 https://rhn.redhat.com/errata/RHSA-2009-1219.html