Headline
Ubuntu Security Notice USN-5483-1
Ubuntu Security Notice 5483-1 - It was discovered that Exempi incorrectly handled certain media files. If a user or automated system were tricked into opening a specially crafted file, a remote attacker could cause Exempi to stop responding or crash, resulting in a denial of service, or possibly execute arbitrary code.
==========================================================================Ubuntu Security Notice USN-5483-1June 16, 2022exempi vulnerabilities==========================================================================A security issue affects these releases of Ubuntu and its derivatives:- Ubuntu 22.04 LTS- Ubuntu 21.10- Ubuntu 20.04 LTS- Ubuntu 18.04 LTSSummary:Several security issues were fixed in Exempi.Software Description:- exempi: library to parse XMP metadataDetails:It was discovered that Exempi incorrectly handled certain media files. If auser or automated system were tricked into opening a specially craftedfile, a remote attacker could cause Exempi to stop responding or crash,resulting in a denial of service, or possibly execute arbitrary code.Update instructions:The problem can be corrected by updating your system to the followingpackage versions:Ubuntu 22.04 LTS: exempi 2.5.2-1ubuntu0.22.04.1 libexempi8 2.5.2-1ubuntu0.22.04.1Ubuntu 21.10: exempi 2.5.2-1ubuntu0.21.10.1 libexempi8 2.5.2-1ubuntu0.21.10.1Ubuntu 20.04 LTS: exempi 2.5.1-1ubuntu0.1 libexempi8 2.5.1-1ubuntu0.1Ubuntu 18.04 LTS: exempi 2.4.5-2ubuntu0.1 libexempi3 2.4.5-2ubuntu0.1In general, a standard system update will make all the necessary changes.References: https://ubuntu.com/security/notices/USN-5483-1 CVE-2018-12648, CVE-2021-36045, CVE-2021-36046, CVE-2021-36047, CVE-2021-36048, CVE-2021-36050, CVE-2021-36051, CVE-2021-36052, CVE-2021-36053, CVE-2021-36054, CVE-2021-36055, CVE-2021-36056, CVE-2021-36058, CVE-2021-36064, CVE-2021-39847, CVE-2021-40716, CVE-2021-40732, CVE-2021-42528, CVE-2021-42529, CVE-2021-42530, CVE-2021-42531, CVE-2021-42532Package Information: https://launchpad.net/ubuntu/+source/exempi/2.5.2-1ubuntu0.22.04.1 https://launchpad.net/ubuntu/+source/exempi/2.5.2-1ubuntu0.21.10.1 https://launchpad.net/ubuntu/+source/exempi/2.5.1-1ubuntu0.1 https://launchpad.net/ubuntu/+source/exempi/2.4.5-2ubuntu0.1
Related news
XMP Toolkit SDK version 2021.07 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.
XMP Toolkit version 2020.1 (and earlier) is affected by a null pointer dereference vulnerability that could result in leaking data from certain memory locations and causing a local denial of service in the context of the current user. User interaction is required to exploit this vulnerability in that the victim will need to open a specially crafted MXF file.
XMP Toolkit version 2020.1 (and earlier) is affected by a memory corruption vulnerability, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.