{"id":"USN-6558-1","summary":"audiofile vulnerabilities","details":"It was discovered that audiofile could be made to dereference invalid\nmemory. If a user or an automated system were tricked into opening a\nspecially crafted file, an attacker could possibly use this issue to cause\na denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu\n18.04 LTS. (CVE-2018-13440)\n\nIt was discovered that audiofile could be made to write out of bounds. If a\nuser or an automated system were tricked into opening a specially crafted\nfile, an attacker could possibly use this issue to cause a denial of\nservice or execute arbitrary code. This issue only affected Ubuntu 16.04\nLTS and Ubuntu 18.04 LTS. (CVE-2018-17095)\n\nIt was discovered that audiofile could be made to dereference invalid\nmemory. If a user or an automated system were tricked into opening a\nspecially crafted file, an attacker could possibly use this issue to cause\na denial of service. (CVE-2019-13147)\n\nIt was discovered that audiofile could be made to leak memory. If a user or\nan automated system were tricked into opening a specially crafted file, an\nattacker could possibly use this issue to obtain sensitive information.\n(CVE-2022-24599)\n","modified":"2026-04-27T17:02:14.286217109Z","published":"2023-12-14T16:44:57Z","related":["UBUNTU-CVE-2018-13440","UBUNTU-CVE-2018-17095","UBUNTU-CVE-2019-13147","UBUNTU-CVE-2022-24599"],"upstream":["CVE-2018-13440","CVE-2018-17095","CVE-2019-13147","CVE-2022-24599","UBUNTU-CVE-2018-13440","UBUNTU-CVE-2018-17095","UBUNTU-CVE-2019-13147","UBUNTU-CVE-2022-24599"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6558-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-13440"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-17095"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-13147"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-24599"}],"affected":[{"package":{"name":"audiofile","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/audiofile@0.3.6-2ubuntu0.14.04.3+esm1?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.3.6-2ubuntu0.14.04.3+esm1"}]}],"versions":["0.3.6-2","0.3.6-2ubuntu0.14.04.1","0.3.6-2ubuntu0.14.04.2","0.3.6-2ubuntu0.14.04.3"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"audiofile-tools","binary_version":"0.3.6-2ubuntu0.14.04.3+esm1"},{"binary_name":"libaudiofile1","binary_version":"0.3.6-2ubuntu0.14.04.3+esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6558-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2019-13147"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-24599"}]}}},{"package":{"name":"audiofile","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/audiofile@0.3.6-2ubuntu0.16.04.1+esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.3.6-2ubuntu0.16.04.1+esm1"}]}],"versions":["0.3.6-2","0.3.6-2ubuntu0.15.10.1","0.3.6-2ubuntu0.16.04.1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_name":"audiofile-tools","binary_version":"0.3.6-2ubuntu0.16.04.1+esm1"},{"binary_name":"libaudiofile1","binary_version":"0.3.6-2ubuntu0.16.04.1+esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6558-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2018-13440"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2018-17095"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2019-13147"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-24599"}]}}},{"package":{"name":"audiofile","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/audiofile@0.3.6-4ubuntu0.1~esm1?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.3.6-4ubuntu0.1~esm1"}]}],"versions":["0.3.6-4"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_name":"audiofile-tools","binary_version":"0.3.6-4ubuntu0.1~esm1"},{"binary_name":"libaudiofile1","binary_version":"0.3.6-4ubuntu0.1~esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6558-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:18.04:LTS","cves":[{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2018-13440"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2018-17095"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2019-13147"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-24599"}]}}},{"package":{"name":"audiofile","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/audiofile@0.3.6-5+deb10u1build0.20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.3.6-5+deb10u1build0.20.04.1"}]}],"versions":["0.3.6-5","0.3.6-5build1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"audiofile-tools","binary_version":"0.3.6-5+deb10u1build0.20.04.1"},{"binary_name":"libaudiofile1","binary_version":"0.3.6-5+deb10u1build0.20.04.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6558-1.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2019-13147"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-24599"}]}}},{"package":{"name":"audiofile","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/audiofile@0.3.6-5+deb10u1build0.22.04.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.3.6-5+deb10u1build0.22.04.1"}]}],"versions":["0.3.6-5build1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"0.3.6-5+deb10u1build0.22.04.1","binary_name":"audiofile-tools"},{"binary_name":"libaudiofile1","binary_version":"0.3.6-5+deb10u1build0.22.04.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6558-1.json","cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2019-13147"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-24599"}]}}}],"schema_version":"1.7.5"}