First published: Mon Oct 09 2023(Updated: )
It was discovered that Ring incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. (CVE-2021-37706) It was discovered that Ring incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-43299, CVE-2021-43300, CVE-2021-43301, CVE-2021-43302, CVE-2021-43303, CVE-2021-43804, CVE-2021-43845, CVE-2022-21723, CVE-2022-23537, CVE-2022-23547, CVE-2022-23608, CVE-2022-24754, CVE-2022-24763, CVE-2022-24764, CVE-2022-24793, CVE-2022-31031, CVE-2022-39244) It was discovered that Ring incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2022-21722) It was discovered that Ring incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. (CVE-2023-27585)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/jami | <20230206.0~ds1-5ubuntu0.1 | 20230206.0~ds1-5ubuntu0.1 |
=23.04 | ||
All of | ||
ubuntu/jami-daemon | <20230206.0~ds1-5ubuntu0.1 | 20230206.0~ds1-5ubuntu0.1 |
=23.04 | ||
All of | ||
ubuntu/jami | <20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1 | 20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1 |
=20.04 | ||
All of | ||
ubuntu/jami-daemon | <20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1 | 20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1 |
=20.04 | ||
All of | ||
ubuntu/ring | <20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1 | 20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1 |
=20.04 | ||
All of | ||
ubuntu/ring-daemon | <20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1 | 20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1 |
=20.04 | ||
All of | ||
ubuntu/ring | <20180228.1.503da2b~ds1-1ubuntu0.1~esm1 | 20180228.1.503da2b~ds1-1ubuntu0.1~esm1 |
=18.04 | ||
All of | ||
ubuntu/ring-daemon | <20180228.1.503da2b~ds1-1ubuntu0.1~esm1 | 20180228.1.503da2b~ds1-1ubuntu0.1~esm1 |
=18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for the Ring vulnerability is CVE-2021-37706.
A remote attacker could exploit the Ring vulnerability by tricking a user or automated system into opening a specially crafted input file.
The severity of the Ring vulnerability is not specified in the information provided.
The versions of Jami affected by the Ring vulnerability are 20230206.0~ds1-5ubuntu0.1, 20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1, and 20180228.1.503da2b~ds1-1ubuntu0.1~esm1.
To fix the Ring vulnerability, update the Jami and Jami-Daemon packages to the specified remedy versions provided by Ubuntu.