Descriptionfield.c in the libid3tag 0.15.0b library allows context-dependent attackers to cause a denial of service (CPU consumption) via an ID3_FIELD_TYPE_STRINGLIST field that ends in '\0', which triggers an infinite loop.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs480187

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libid3tag (PTS)sid, trixie, buster, bookworm, bullseye0.15.1b-14fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


[etch] - libid3tag <no-dsa> (Minor issue)
totally different approach to fix the bug, see Kurts comments in the bug report

Search for package or bug name: Reporting problems