First published: Mon Mar 31 2025(Updated: )
Xiantong Hou discovered that AOM did not properly handle certain malformed media files. If an application using AOM opened a specially crafted file, a remote attacker could cause a denial of service, or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/aom-tools | <3.3.0-1ubuntu0.1 | 3.3.0-1ubuntu0.1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/libaom-dev | <3.3.0-1ubuntu0.1 | 3.3.0-1ubuntu0.1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/libaom3 | <3.3.0-1ubuntu0.1 | 3.3.0-1ubuntu0.1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/aom-tools | <1.0.0.errata1-3+deb11u1ubuntu0.1 | 1.0.0.errata1-3+deb11u1ubuntu0.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/libaom-dev | <1.0.0.errata1-3+deb11u1ubuntu0.1 | 1.0.0.errata1-3+deb11u1ubuntu0.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/libaom0 | <1.0.0.errata1-3+deb11u1ubuntu0.1 | 1.0.0.errata1-3+deb11u1ubuntu0.1 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-7397-1 has a high severity due to denial of service and potential arbitrary code execution risks.
To remediate USN-7397-1, upgrade to aom-tools, libaom-dev, or libaom3 version 3.3.0-1ubuntu0.1 or newer on Ubuntu 22.04.
USN-7397-1 affects Ubuntu 20.04 and 22.04 systems running specific versions of aom-tools, libaom-dev, and libaom.
USN-7397-1 may lead to application crashes or unauthorized code execution if a vulnerable media file is opened.
There is no known workaround for USN-7397-1, so applying the update is recommended.