First published: Tue Feb 13 2018(Updated: )
It was discovered that libvorbis incorrectly handled certain sound files. An attacker could possibly use this to execute arbitrary code. (CVE-2017-14632) It was discovered that libvorbis incorrectly handled certain sound files. An attacker could use this to cause a denial of service. (CVE-2017-14633)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libvorbis0a | <1.3.5-4ubuntu0.1 | 1.3.5-4ubuntu0.1 |
Ubuntu OpenSSH Client | =17.10 | |
All of | ||
ubuntu/libvorbis0a | <1.3.5-3ubuntu0.1 | 1.3.5-3ubuntu0.1 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/libvorbis0a | <1.3.2-1.3ubuntu1.1 | 1.3.2-1.3ubuntu1.1 |
Ubuntu OpenSSH Client | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-3569-1 is high due to the potential for arbitrary code execution or denial of service.
To fix USN-3569-1, upgrade the libvorbis0a package to version 1.3.5-4ubuntu0.1 for Ubuntu 17.10, 1.3.5-3ubuntu0.1 for Ubuntu 16.04, or 1.3.2-1.3ubuntu1.1 for Ubuntu 14.04.
USN-3569-1 affects Ubuntu versions 14.04, 16.04, and 17.10 due to vulnerabilities in libvorbis.
USN-3569-1 describes vulnerabilities in libvorbis that can result in arbitrary code execution or denial of service.
As of the latest information, there are no confirmed reports of active exploitation related to USN-3569-1.