Ubuntu Security Notice 5937-1 - It was discovered that Opusfile was not properly validating pointer arguments in some of its functions, which could lead to a NULL pointer dereference. An attacker could possibly use this issue to cause a denial of service or have other unspecified impacts.
7680444a54c66d9d7e8f1739367a5b53e4a0588e1de76a91f85ca3bd7997b7e9
==========================================================================
Ubuntu Security Notice USN-5937-1
March 08, 2023
opusfile vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
Summary:
Opusfile could be made to crash if it received specially crafted input.
Software Description:
- opusfile: debugging symbols for libopusfile
Details:
It was discovered that Opusfile was not properly validating pointer
arguments in some of its functions, which could lead to a NULL pointer
dereference. An attacker could possibly use this issue to cause a denial
of service or have other unspecified impacts.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS:
libopusfile0 0.9+20170913-1.1ubuntu0.1~esm1
Ubuntu 20.04 LTS:
libopusfile0 0.9+20170913-1ubuntu0.20.04.1~esm1
Ubuntu 18.04 LTS:
libopusfile0 0.9+20170913-1ubuntu0.18.04.1~esm1
Ubuntu 16.04 ESM:
libopusfile0 0.7-1ubuntu0.1~esm1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5937-1
CVE-2022-47021
Package Information: