USN-6815-1

Source
https://ubuntu.com/security/notices/USN-6815-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6815-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-6815-1
Related
Published
2024-06-06T18:12:41.850211Z
Modified
2024-06-06T18:12:41.850211Z
Summary
aom vulnerability
Details

Xiantong Hou discovered that AOM did not properly handle certain malformed media files. If an application using AOM opened a specially crafted file, a remote attacker could cause a denial of service, or possibly execute arbitrary code.

References

Affected packages

Ubuntu:24.04:LTS / aom

Package

Name
aom
Purl
pkg:deb/ubuntu/aom@3.8.2-2ubuntu0.1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.8.2-2ubuntu0.1

Affected versions

3.*

3.6.1-1
3.7.0-1
3.7.1-1
3.8.1-1
3.8.2-2build1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "3.8.2-2ubuntu0.1",
            "binary_name": "aom-tools"
        },
        {
            "binary_version": "3.8.2-2ubuntu0.1",
            "binary_name": "aom-tools-dbgsym"
        },
        {
            "binary_version": "3.8.2-2ubuntu0.1",
            "binary_name": "libaom-dev"
        },
        {
            "binary_version": "3.8.2-2ubuntu0.1",
            "binary_name": "libaom-doc"
        },
        {
            "binary_version": "3.8.2-2ubuntu0.1",
            "binary_name": "libaom3"
        },
        {
            "binary_version": "3.8.2-2ubuntu0.1",
            "binary_name": "libaom3-dbgsym"
        }
    ]
}