-----BEGIN PGP SIGNATURE-----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=DarS
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6558-1
December 14, 2023
audiofile vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.10
- Ubuntu 23.04
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)
Summary:
Several security issues were fixed in audiofile.
Software Description:
- audiofile: Open-source version of the SGI audiofile library
Details:
It was discovered that audiofile could be made to dereference invalid
memory. If a user or an automated system were tricked into opening a
specially crafted file, an attacker could possibly use this issue to cause
a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu
18.04 LTS. (CVE-2018-13440)
It was discovered that audiofile could be made to write out of bounds. If a
user or an automated system were tricked into opening a specially crafted
file, an attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. This issue only affected Ubuntu 16.04
LTS and Ubuntu 18.04 LTS. (CVE-2018-17095)
It was discovered that audiofile could be made to dereference invalid
memory. If a user or an automated system were tricked into opening a
specially crafted file, an attacker could possibly use this issue to cause
a denial of service. (CVE-2019-13147)
It was discovered that audiofile could be made to leak memory. If a user or
an automated system were tricked into opening a specially crafted file, an
attacker could possibly use this issue to obtain sensitive information.
(CVE-2022-24599)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 23.10:
audiofile-tools 0.3.6-5+deb10u1build0.23.10.1
libaudiofile1 0.3.6-5+deb10u1build0.23.10.1
Ubuntu 23.04:
audiofile-tools 0.3.6-5+deb10u1build0.23.04.1
libaudiofile1 0.3.6-5+deb10u1build0.23.04.1
Ubuntu 22.04 LTS:
audiofile-tools 0.3.6-5+deb10u1build0.22.04.1
libaudiofile1 0.3.6-5+deb10u1build0.22.04.1
Ubuntu 20.04 LTS:
audiofile-tools 0.3.6-5+deb10u1build0.20.04.1
libaudiofile1 0.3.6-5+deb10u1build0.20.04.1
Ubuntu 18.04 LTS (Available with Ubuntu Pro):
audiofile-tools 0.3.6-4ubuntu0.1~esm1
libaudiofile1 0.3.6-4ubuntu0.1~esm1
Ubuntu 16.04 LTS (Available with Ubuntu Pro):
audiofile-tools 0.3.6-2ubuntu0.16.04.1+esm1
libaudiofile1 0.3.6-2ubuntu0.16.04.1+esm1
Ubuntu 14.04 LTS (Available with Ubuntu Pro):
audiofile-tools 0.3.6-2ubuntu0.14.04.3+esm1
libaudiofile1 0.3.6-2ubuntu0.14.04.3+esm1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6558-1
CVE-2018-13440, CVE-2018-17095, CVE-2019-13147, CVE-2022-24599
Package Information:
https://launchpad.net/ubuntu/+source/audiofile/0.3.6-5+deb10u1build0.23.10.1
https://launchpad.net/ubuntu/+source/audiofile/0.3.6-5+deb10u1build0.23.04.1
https://launchpad.net/ubuntu/+source/audiofile/0.3.6-5+deb10u1build0.22.04.1
https://launchpad.net/ubuntu/+source/audiofile/0.3.6-5+deb10u1build0.20.04.1
No comments:
Post a Comment