First published: Tue Aug 29 2023(Updated: )
It was discovered that FAAD2 incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. (CVE-2021-32272, CVE-2021-32273, CVE-2021-32274, CVE-2021-32277, CVE-2021-32278, CVE-2023-38857, CVE-2023-38858) It was discovered that FAAD2 incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. (CVE-2021-32276)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/faad | <2.9.1-1ubuntu0.1 | 2.9.1-1ubuntu0.1 |
=20.04 | ||
All of | ||
ubuntu/libfaad-dev | <2.9.1-1ubuntu0.1 | 2.9.1-1ubuntu0.1 |
=20.04 | ||
All of | ||
ubuntu/libfaad2 | <2.9.1-1ubuntu0.1 | 2.9.1-1ubuntu0.1 |
=20.04 | ||
All of | ||
ubuntu/faad | <2.8.8-1ubuntu0.1~esm1 | 2.8.8-1ubuntu0.1~esm1 |
=18.04 | ||
All of | ||
ubuntu/libfaad-dev | <2.8.8-1ubuntu0.1~esm1 | 2.8.8-1ubuntu0.1~esm1 |
=18.04 | ||
All of | ||
ubuntu/libfaad2 | <2.8.8-1ubuntu0.1~esm1 | 2.8.8-1ubuntu0.1~esm1 |
=18.04 | ||
All of | ||
ubuntu/faad | <2.8.0~cvs20150510-1ubuntu0.1+esm1 | 2.8.0~cvs20150510-1ubuntu0.1+esm1 |
=16.04 | ||
All of | ||
ubuntu/libfaad-dev | <2.8.0~cvs20150510-1ubuntu0.1+esm1 | 2.8.0~cvs20150510-1ubuntu0.1+esm1 |
=16.04 | ||
All of | ||
ubuntu/libfaad2 | <2.8.0~cvs20150510-1ubuntu0.1+esm1 | 2.8.0~cvs20150510-1ubuntu0.1+esm1 |
=16.04 | ||
All of | ||
ubuntu/faad | <2.7-8+deb8u3ubuntu0.1~esm1 | 2.7-8+deb8u3ubuntu0.1~esm1 |
=14.04 | ||
All of | ||
ubuntu/libfaad-dev | <2.7-8+deb8u3ubuntu0.1~esm1 | 2.7-8+deb8u3ubuntu0.1~esm1 |
=14.04 | ||
All of | ||
ubuntu/libfaad2 | <2.7-8+deb8u3ubuntu0.1~esm1 | 2.7-8+deb8u3ubuntu0.1~esm1 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-6313-1 is high.
FAAD2 incorrectly handles certain inputs, which can lead to the execution of arbitrary code.
A remote attacker can exploit the FAAD2 vulnerabilities by tricking a user or system into opening a specially crafted input file.
The recommended remedy for the FAAD2 vulnerabilities is to update to version 2.9.1-1ubuntu0.1 (for Ubuntu 20.04), 2.8.8-1ubuntu0.1~esm1 (for Ubuntu 18.04), 2.8.0~cvs20150510-1ubuntu0.1+esm1 (for Ubuntu 16.04), or 2.7-8+deb8u3ubuntu0.1~esm1 (for Ubuntu 14.04).
More information about the FAAD2 vulnerabilities can be found on the Ubuntu Security Notices website.