[ubuntu/precise-security] libav 4:0.8.17-0ubuntu0.12.04.2 (Accepted)
Marc Deslauriers
marc.deslauriers at canonical.com
Mon Apr 4 18:00:31 UTC 2016
libav (4:0.8.17-0ubuntu0.12.04.2) precise-security; urgency=medium
* SECURITY UPDATE: invalid memory access via crafted MJPEG data
- debian/patches/CVE-2014-8541.patch: check for pixel format changes in
libavcodec/mjpegdec.c.
- CVE-2014-8541
* SECURITY UPDATE: out of array access in ff_mjpeg_decode_sof
- debian/patches/CVE-2015-1872.patch: check number of components in
libavcodec/mjpegdec.c.
- CVE-2015-1872
* SECURITY UPDATE: out of bounds array access in msrle_decode_pal4
- debian/patches/CVE-2015-3395.patch: determine frame size in
libavcodec/msrledec.c.
- CVE-2015-3395
* SECURITY UPDATE: size issue in ff_h263_decode_picture_header
- debian/patches/CVE-2015-5479.patch: check both dimensions in
libavcodec/ituh263dec.c.
- CVE-2015-5479
* SECURITY UPDATE: out of bounds array access in decode_ihdr_chunk
- debian/patches/CVE-2015-6818.patch: only allow one IHDR chunk in
libavcodec/pngdec.c.
- CVE-2015-6818
* SECURITY UPDATE: out of bounds array access in ff_sbr_apply
- debian/patches/CVE-2015-6820.patch: check that the element type
matches in libavcodec/aacsbr.c, libavcodec/sbr.h.
- CVE-2015-6820
* SECURITY UPDATE: uninitialized memory access in sws_init_context
- debian/patches/CVE-2015-6824.patch: clear buffers in
libswscale/utils.c
- CVE-2015-6824
* SECURITY UPDATE: invalid pointer use in ff_rv34_decode_init_thread_copy
- debian/patches/CVE-2015-6826.patch: clear pointers in
libavcodec/rv34.c.
- CVE-2015-6826
* SECURITY UPDATE: integer overflow in ff_ivi_init_planes
- debian/patches/CVE-2015-8364.patch: check image dimensions in
libavcodec/ivi_common.c.
- CVE-2015-8364
* SECURITY UPDATE: out of bounds array access in smka_decode_frame
- debian/patches/CVE-2015-8365.patch: validate data size in
libavcodec/smacker.c.
- CVE-2015-8365
* SECURITY UPDATE: cross-origin attack and arbitrary file read via the
concat protocol
- debian/confflags: disable concat protocol.
- CVE-2016-1897
- CVE-2016-1898
* SECURITY UPDATE: integer overflow in asf_write_packet
- debian/patches/CVE-2016-2326.patch: check pts in
libavformat/asfenc.c.
- CVE-2016-2326
* SECURITY UPDATE: out of bounds array access via tga file
- debian/patches/CVE-2016-2330.patch: fix lzw buffer size in
libavcodec/gif.c.
- CVE-2016-2330
Date: 2016-04-01 14:21:13.857991+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/libav/4:0.8.17-0ubuntu0.12.04.2
-------------- next part --------------
Sorry, changesfile not available.
More information about the Precise-changes
mailing list