First published: Tue Aug 22 2023(Updated: )
Buffer Overflow vulnerability in function bitwriter_grow_ in flac before 1.4.0 allows remote attackers to run arbitrary code via crafted input to the encoder.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/flac | <=1.3.2-3+deb10u2 | 1.3.2-3+deb10u3 1.3.3-2+deb11u2 1.4.2+ds-2 1.4.3+ds-2 |
ubuntu/flac | <1.3.3-1ubuntu0.2 | 1.3.3-1ubuntu0.2 |
ubuntu/flac | <1.3.3-2ubuntu0.2 | 1.3.3-2ubuntu0.2 |
ubuntu/flac | <1.3.2-1ubuntu0.1+ | 1.3.2-1ubuntu0.1+ |
ubuntu/flac | <1.3.0-2ubuntu0.14.04.1+ | 1.3.0-2ubuntu0.14.04.1+ |
ubuntu/flac | <1.3.1-4ubuntu0.1~ | 1.3.1-4ubuntu0.1~ |
ubuntu/flac | <1.4.0 | 1.4.0 |
redhat/flac | <1.4.2 | 1.4.2 |
FLAC | <1.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2020-22219.
The severity level of CVE-2020-22219 is high with a CVSS score of 7.8.
The vulnerability in function bitwriter_grow_ in flac before 1.4.0 occurs due to a buffer overflow, allowing remote attackers to run arbitrary code via crafted input to the encoder.
Versions of flac up to and including 1.4.0 are affected by this vulnerability.
To fix CVE-2020-22219, update to version 1.4.2 of flac or later.