USN-611-1: Speex vulnerability

08 May 2008

Speex vulnerability

Releases

Packages

Details

It was discovered that Speex did not properly validate its input when
processing Speex file headers. If a user or automated system were
tricked into opening a specially crafted Speex file, an attacker could
create a denial of service in applications linked against Speex or
possibly execute arbitrary code as the user invoking the program.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 8.04
Ubuntu 7.10
Ubuntu 7.04
Ubuntu 6.06

After a standard system upgrade you need to restart applications linked against
Speex to effect the necessary changes.

References

Related notices