First published: Thu Sep 07 2023(Updated: )
Wooseok Kang discovered that PLIB did not properly manage memory under certain circumstances. If a user were tricked into opening a specially crafted TGA file, an attacker could possibly use this issue to cause applications using PLIB to crash, resulting in a denial of service, or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libplib1 | <1.8.5-8ubuntu0.20.04.1 | 1.8.5-8ubuntu0.20.04.1 |
=20.04 | ||
All of | ||
ubuntu/libplib1 | <1.8.5-8ubuntu0.18.04.1~esm1 | 1.8.5-8ubuntu0.18.04.1~esm1 |
=18.04 | ||
All of | ||
ubuntu/libplib1 | <1.8.5-7ubuntu0.1~esm1 | 1.8.5-7ubuntu0.1~esm1 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this PLIB vulnerability is USN-6353-1.
The severity of the PLIB vulnerability is not specified in the information provided.
An attacker can exploit this vulnerability by tricking a user into opening a specially crafted TGA file, which can cause applications using PLIB to crash or possibly execute malicious code.
This vulnerability affects Ubuntu versions 20.04, 18.04, and 16.04.
To fix this vulnerability, you should update the 'libplib1' package to version 1.8.5-8ubuntu0.20.04.1 for Ubuntu 20.04, version 1.8.5-8ubuntu0.18.04.1~esm1 for Ubuntu 18.04, or version 1.8.5-7ubuntu0.1~esm1 for Ubuntu 16.04.