Buffer Overflow vulnerability in FFmpeg version n6.1-3-g466799d4f5, allows a local attacker to execute arbitrary code and cause a denial of service (DoS) via the af_dialoguenhance.c:261:5 in the de_stereo component. https://trac.ffmpeg.org/ticket/10691
Created chromium tracking bugs for this issue: Affects: epel-all [bug 2274695] Created ffmpeg tracking bugs for this issue: Affects: fedora-all [bug 2274694] Created qt5-qtwebengine tracking bugs for this issue: Affects: epel-all [bug 2274696] Affects: fedora-all [bug 2274697] Created qt6-qtwebengine tracking bugs for this issue: Affects: fedora-all [bug 2274698]
FWIW, this seems to be fixed by https://git.ffmpeg.org/gitweb/ffmpeg.git/patch/2d9ed64859c9887d0504cd71dbd5b2c15e14251a in 7.0 or later.