Lucene search

K
ubuntuUbuntuUSN-5733-1
HistoryNov 21, 2022 - 12:00 a.m.

FLAC vulnerabilities

2022-11-2100:00:00
ubuntu.com
26
ubuntu
memory leak
denial of service
bounds checking
sensitive information

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.4

Confidence

High

EPSS

0.008

Percentile

81.5%

Releases

  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 ESM
  • Ubuntu 16.04 ESM
  • Ubuntu 14.04 ESM

Packages

  • flac - Free Lossless Audio Codec

Details

It was discovered that FLAC was not properly performing memory management
operations, which could result in a memory leak. An attacker could possibly
use this issue to cause FLAC to consume resources, leading to a denial of
service. This issue only affected Ubuntu 14.04 ESM, Ubuntu 16.04 ESM and
Ubuntu 18.04 LTS. (CVE-2017-6888)

It was discovered that FLAC was not properly performing bounds checking
operations when decoding data. If a user or automated system were tricked
into processing a specially crafted file, an attacker could possibly use
this issue to expose sensitive information or to cause FLAC to crash,
leading to a denial of service. This issue only affected Ubuntu 14.04 ESM,
Ubuntu 16.04 ESM, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-0499)

It was discovered that FLAC was not properly performing bounds checking
operations when encoding data. If a user or automated system were tricked
into processing a specially crafted file, an attacker could possibly use
this issue to expose sensitive information or to cause FLAC to crash,
leading to a denial of service. (CVE-2021-0561)

OSVersionArchitecturePackageVersionFilename
Ubuntu22.04noarchflac< 1.3.3-2ubuntu0.1UNKNOWN
Ubuntu22.04noarchflac-dbgsym< 1.3.3-2ubuntu0.1UNKNOWN
Ubuntu22.04noarchlibflac++-dev< 1.3.3-2ubuntu0.1UNKNOWN
Ubuntu22.04noarchlibflac++6v5< 1.3.3-2ubuntu0.1UNKNOWN
Ubuntu22.04noarchlibflac++6v5-dbgsym< 1.3.3-2ubuntu0.1UNKNOWN
Ubuntu22.04noarchlibflac-dev< 1.3.3-2ubuntu0.1UNKNOWN
Ubuntu22.04noarchlibflac-doc< 1.3.3-2ubuntu0.1UNKNOWN
Ubuntu22.04noarchlibflac8< 1.3.3-2ubuntu0.1UNKNOWN
Ubuntu22.04noarchlibflac8-dbgsym< 1.3.3-2ubuntu0.1UNKNOWN
Ubuntu20.04noarchflac< 1.3.3-1ubuntu0.1UNKNOWN
Rows per page:
1-10 of 441

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.4

Confidence

High

EPSS

0.008

Percentile

81.5%