Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-5483-1

Ubuntu Security Notice 5483-1 - It was discovered that Exempi incorrectly handled certain media files. If a user or automated system were tricked into opening a specially crafted file, a remote attacker could cause Exempi to stop responding or crash, resulting in a denial of service, or possibly execute arbitrary code.

Packet Storm
#vulnerability#ubuntu#dos
==========================================================================Ubuntu Security Notice USN-5483-1June 16, 2022exempi vulnerabilities==========================================================================A security issue affects these releases of Ubuntu and its derivatives:- Ubuntu 22.04 LTS- Ubuntu 21.10- Ubuntu 20.04 LTS- Ubuntu 18.04 LTSSummary:Several security issues were fixed in Exempi.Software Description:- exempi: library to parse XMP metadataDetails:It was discovered that Exempi incorrectly handled certain media files. If auser or automated system were tricked into opening a specially craftedfile, a remote attacker could cause Exempi to stop responding or crash,resulting in a denial of service, or possibly execute arbitrary code.Update instructions:The problem can be corrected by updating your system to the followingpackage versions:Ubuntu 22.04 LTS:  exempi                          2.5.2-1ubuntu0.22.04.1  libexempi8                      2.5.2-1ubuntu0.22.04.1Ubuntu 21.10:  exempi                          2.5.2-1ubuntu0.21.10.1  libexempi8                      2.5.2-1ubuntu0.21.10.1Ubuntu 20.04 LTS:  exempi                          2.5.1-1ubuntu0.1  libexempi8                      2.5.1-1ubuntu0.1Ubuntu 18.04 LTS:  exempi                          2.4.5-2ubuntu0.1  libexempi3                      2.4.5-2ubuntu0.1In general, a standard system update will make all the necessary changes.References:  https://ubuntu.com/security/notices/USN-5483-1  CVE-2018-12648, CVE-2021-36045, CVE-2021-36046, CVE-2021-36047,  CVE-2021-36048, CVE-2021-36050, CVE-2021-36051, CVE-2021-36052,  CVE-2021-36053, CVE-2021-36054, CVE-2021-36055, CVE-2021-36056,  CVE-2021-36058, CVE-2021-36064, CVE-2021-39847, CVE-2021-40716,  CVE-2021-40732, CVE-2021-42528, CVE-2021-42529, CVE-2021-42530,  CVE-2021-42531, CVE-2021-42532Package Information:  https://launchpad.net/ubuntu/+source/exempi/2.5.2-1ubuntu0.22.04.1  https://launchpad.net/ubuntu/+source/exempi/2.5.2-1ubuntu0.21.10.1  https://launchpad.net/ubuntu/+source/exempi/2.5.1-1ubuntu0.1  https://launchpad.net/ubuntu/+source/exempi/2.4.5-2ubuntu0.1

Related news

CVE-2021-42532: Adobe Security Bulletin

XMP Toolkit SDK version 2021.07 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.

CVE-2021-40732: Adobe Security Bulletin

XMP Toolkit version 2020.1 (and earlier) is affected by a null pointer dereference vulnerability that could result in leaking data from certain memory locations and causing a local denial of service in the context of the current user. User interaction is required to exploit this vulnerability in that the victim will need to open a specially crafted MXF file.

CVE-2021-36052: Adobe Security Bulletin

XMP Toolkit version 2020.1 (and earlier) is affected by a memory corruption vulnerability, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

Packet Storm: Latest News

NIELD (Network Interface Events Logging Daemon) 0.6.2