Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-5733-1

Ubuntu Security Notice 5733-1 - It was discovered that FLAC was not properly performing memory management operations, which could result in a memory leak. An attacker could possibly use this issue to cause FLAC to consume resources, leading to a denial of service. This issue only affected Ubuntu 14.04 ESM, Ubuntu 16.04 ESM and Ubuntu 18.04 LTS. It was discovered that FLAC was not properly performing bounds checking operations when decoding data. If a user or automated system were tricked into processing a specially crafted file, an attacker could possibly use this issue to expose sensitive information or to cause FLAC to crash, leading to a denial of service. This issue only affected Ubuntu 14.04 ESM, Ubuntu 16.04 ESM, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.

Packet Storm
#vulnerability#ubuntu#dos#c++#perl#ssl
==========================================================================Ubuntu Security Notice USN-5733-1November 21, 2022flac vulnerabilities==========================================================================A security issue affects these releases of Ubuntu and its derivatives:- Ubuntu 22.04 LTS- Ubuntu 20.04 LTS- Ubuntu 18.04 LTS- Ubuntu 16.04 ESM- Ubuntu 14.04 ESMSummary:Several security issues were fixed in FLAC.Software Description:- flac: Free Lossless Audio CodecDetails:It was discovered that FLAC was not properly performing memory managementoperations, which could result in a memory leak. An attacker could possiblyuse this issue to cause FLAC to consume resources, leading to a denial ofservice. This issue only affected Ubuntu 14.04 ESM, Ubuntu 16.04 ESM andUbuntu 18.04 LTS. (CVE-2017-6888)It was discovered that FLAC was not properly performing bounds checkingoperations when decoding data. If a user or automated system were trickedinto processing a specially crafted file, an attacker could possibly usethis issue to expose sensitive information or to cause FLAC to crash,leading to a denial of service. This issue only affected Ubuntu 14.04 ESM,Ubuntu 16.04 ESM, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-0499)It was discovered that FLAC was not properly performing bounds checkingoperations when encoding data. If a user or automated system were trickedinto processing a specially crafted file, an attacker could possibly usethis issue to expose sensitive information or to cause FLAC to crash,leading to a denial of service. (CVE-2021-0561)Update instructions:The problem can be corrected by updating your system to the followingpackage versions:Ubuntu 22.04 LTS:   flac                            1.3.3-2ubuntu0.1   libflac++6v5                    1.3.3-2ubuntu0.1   libflac8                        1.3.3-2ubuntu0.1Ubuntu 20.04 LTS:   flac                            1.3.3-1ubuntu0.1   libflac++6v5                    1.3.3-1ubuntu0.1   libflac8                        1.3.3-1ubuntu0.1Ubuntu 18.04 LTS:   flac                            1.3.2-1ubuntu0.1   libflac++6v5                    1.3.2-1ubuntu0.1   libflac8                        1.3.2-1ubuntu0.1Ubuntu 16.04 ESM:   flac                            1.3.1-4ubuntu0.1~esm1   libflac++6v5                    1.3.1-4ubuntu0.1~esm1   libflac8                        1.3.1-4ubuntu0.1~esm1Ubuntu 14.04 ESM:   flac                            1.3.0-2ubuntu0.14.04.1+esm1   libflac++6                      1.3.0-2ubuntu0.14.04.1+esm1   libflac8                        1.3.0-2ubuntu0.14.04.1+esm1In general, a standard system update will make all the necessary changes.References:   https://ubuntu.com/security/notices/USN-5733-1   CVE-2017-6888, CVE-2020-0499, CVE-2021-0561Package Information:   https://launchpad.net/ubuntu/+source/flac/1.3.3-2ubuntu0.1   https://launchpad.net/ubuntu/+source/flac/1.3.3-1ubuntu0.1   https://launchpad.net/ubuntu/+source/flac/1.3.2-1ubuntu0.1

Related news

CVE-2022-29838: WDC-22019 My Cloud Firmware Version 5.25.124 | Western Digital

Improper Authentication vulnerability in the encrypted volumes and auto mount features of Western Digital My Cloud devices allows insecure direct access to the drive information in the case of a device reset. This issue affects: Western Digital My Cloud My Cloud versions prior to 5.25.124 on Linux.

RHSA-2022:8078: Red Hat Security Advisory: flac security update

An update for flac is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-0561: flac: out of bound write in append_to_verify_fifo_interleaved_ of stream_encoder.c

CVE-2021-0561: Pixel Update Bulletin—June 2021  |  Android Open Source Project

In append_to_verify_fifo_interleaved_ of stream_encoder.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-174302683

CVE-2020-0202: Pixel Update Bulletin—December 2020  |  Android Open Source Project

In onHandleIntent of TraceService.java, there is a possible bypass of developer settings requirements for capturing system traces due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11 Android ID: A-142936525

CVE-2020-0202: Pixel Update Bulletin—December 2020  |  Android Open Source Project

In onHandleIntent of TraceService.java, there is a possible bypass of developer settings requirements for capturing system traces due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11 Android ID: A-142936525

Packet Storm: Latest News

htmly 2.9.9 Cross Site Scripting