[USN-5937-1] Opusfile vulnerability
Camila Camargo de Matos
camila.camargodematos at canonical.com
Wed Mar 8 14:44:54 UTC 2023
==========================================================================
Ubuntu Security Notice USN-5937-1
March 08, 2023
opusfile vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
Summary:
Opusfile could be made to crash if it received specially crafted input.
Software Description:
- opusfile: debugging symbols for libopusfile
Details:
It was discovered that Opusfile was not properly validating pointer
arguments in some of its functions, which could lead to a NULL pointer
dereference. An attacker could possibly use this issue to cause a denial
of service or have other unspecified impacts.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS:
libopusfile0 0.9+20170913-1.1ubuntu0.1~esm1
Ubuntu 20.04 LTS:
libopusfile0 0.9+20170913-1ubuntu0.20.04.1~esm1
Ubuntu 18.04 LTS:
libopusfile0 0.9+20170913-1ubuntu0.18.04.1~esm1
Ubuntu 16.04 ESM:
libopusfile0 0.7-1ubuntu0.1~esm1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5937-1
CVE-2022-47021
Package Information:
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 495 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20230308/37d59830/attachment.sig>
More information about the ubuntu-security-announce
mailing list