[USN-5937-1] Opusfile vulnerability

Camila Camargo de Matos camila.camargodematos at canonical.com
Wed Mar 8 14:44:54 UTC 2023


==========================================================================
Ubuntu Security Notice USN-5937-1
March 08, 2023

opusfile vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM

Summary:

Opusfile could be made to crash if it received specially crafted input.

Software Description:
- opusfile: debugging symbols for libopusfile

Details:

It was discovered that Opusfile was not properly validating pointer
arguments in some of its functions, which could lead to a NULL pointer
dereference. An attacker could possibly use this issue to cause a denial
of service or have other unspecified impacts.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
   libopusfile0                    0.9+20170913-1.1ubuntu0.1~esm1

Ubuntu 20.04 LTS:
   libopusfile0 0.9+20170913-1ubuntu0.20.04.1~esm1

Ubuntu 18.04 LTS:
   libopusfile0 0.9+20170913-1ubuntu0.18.04.1~esm1

Ubuntu 16.04 ESM:
   libopusfile0                    0.7-1ubuntu0.1~esm1

In general, a standard system update will make all the necessary changes.

References:
   https://ubuntu.com/security/notices/USN-5937-1
   CVE-2022-47021

Package Information:

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 495 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20230308/37d59830/attachment.sig>


More information about the ubuntu-security-announce mailing list