Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-5937-1

Ubuntu Security Notice 5937-1 - It was discovered that Opusfile was not properly validating pointer arguments in some of its functions, which could lead to a NULL pointer dereference. An attacker could possibly use this issue to cause a denial of service or have other unspecified impacts.

Packet Storm
#vulnerability#ubuntu#dos#perl

==========================================================================
Ubuntu Security Notice USN-5937-1
March 08, 2023

opusfile vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 ESM

Summary:

Opusfile could be made to crash if it received specially crafted input.

Software Description:

  • opusfile: debugging symbols for libopusfile

Details:

It was discovered that Opusfile was not properly validating pointer
arguments in some of its functions, which could lead to a NULL pointer
dereference. An attacker could possibly use this issue to cause a denial
of service or have other unspecified impacts.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
libopusfile0 0.9+20170913-1.1ubuntu0.1~esm1

Ubuntu 20.04 LTS:
libopusfile0 0.9+20170913-1ubuntu0.20.04.1~esm1

Ubuntu 18.04 LTS:
libopusfile0 0.9+20170913-1ubuntu0.18.04.1~esm1

Ubuntu 16.04 ESM:
libopusfile0 0.7-1ubuntu0.1~esm1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-5937-1
CVE-2022-47021

Package Information:

Related news

CVE-2022-47021: Propagate allocation failure from ogg_sync_buffer. · xiph/opusfile@0a4cd79

A null pointer dereference issue was discovered in functions op_get_data and op_open1 in opusfile.c in xiph opusfile 0.9 thru 0.12 allows attackers to cause denial of service or other unspecified impacts.

Packet Storm: Latest News

ABB Cylon Aspect 3.07.02 user.properties Default Credentials