First published: Mon Sep 20 2021(Updated: )
An issue was discovered in faad2 through 2.10.0. A heap-buffer-overflow exists in the function lt_prediction located in lt_predict.c. It allows an attacker to cause code Execution.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Faad2 Project Faad2 | <=2.10.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
ubuntu/faad2 | <2.7-8+ | 2.7-8+ |
ubuntu/faad2 | <2.8.8-1ubuntu0.1~ | 2.8.8-1ubuntu0.1~ |
ubuntu/faad2 | <2.9.1-1ubuntu0.1 | 2.9.1-1ubuntu0.1 |
ubuntu/faad2 | <2.8.0~ | 2.8.0~ |
debian/faad2 | 2.10.0-1~deb10u1 2.10.0-1 2.10.1-1 2.11.1-1 | |
<=2.10.0 | ||
=9.0 | ||
=10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32278 is a vulnerability in faad2 library that allows an attacker to cause code execution through a heap buffer overflow.
The vulnerability in faad2 is a heap buffer overflow in the function lt_prediction located in lt_predict.c.
Versions 2.7-8+ to 2.10.0 of faad2 on Ubuntu and Debian are affected by CVE-2021-32278.
You can fix CVE-2021-32278 on Ubuntu by updating the faad2 package to version 2.8.8-1ubuntu0.1~ for Bionic, 2.9.1-1ubuntu0.1 for Focal, or 2.10.0-1~deb10u1, 2.10.0-1, or 2.10.1-1 for Debian.
More information about CVE-2021-32278 can be found on the MITRE CVE database, GitHub issue #62, and the Ubuntu security notices USN-6313-1.