Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2007-6277

Publication date 7 December 2007

Last updated 24 July 2024


Ubuntu priority

Multiple buffer overflows in Free Lossless Audio Codec (FLAC) libFLAC before 1.2.1 allow user-assisted remote attackers to execute arbitrary code via large (1) Metadata Block Size, (2) VORBIS Comment String Size, (3) Picture Metadata MIME-TYPE Size, (4) Picture Description Size, (5) Picture Data Length, (6) Padding Length, and (7) PICTURE Metadata width and height values in a .FLAC file, which result in a heap-based overflow; and large (8) VORBIS Comment String Size Length, (9) Picture MIME-Type, (10) Picture MIME-Type URL, and (11) Picture Description Length values in a .FLAC file, which result in a stack-based overflow. NOTE: some of these issues may overlap CVE-2007-4619.

Read the notes from the security team

Status

Package Ubuntu Release Status
flac 7.10 gutsy
Fixed 1.1.4-3ubuntu1.1
7.04 feisty
Fixed 1.1.2-5ubuntu2.1
6.10 edgy
Fixed 1.1.2-5ubuntu1.1
6.06 LTS dapper
Fixed 1.1.2-3ubuntu1.1

Notes


jdstrand

debian DSA is identical except they left out a couple of safe_ calls. This was fixed in Ubuntu's fix for CVE-2007-4619 note that CVE-2007-4619 was very general and came out before the iDefense CVEs, so there is overlap

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
flac