[ubuntu/precise-updates] libav 4:0.8.17-0ubuntu0.12.04.2 (Accepted)

Ubuntu Archive Robot cjwatson+ubuntu-archive-robot at chiark.greenend.org.uk
Mon Apr 4 18:28:10 UTC 2016

libav (4:0.8.17-0ubuntu0.12.04.2) precise-security; urgency=medium

  * SECURITY UPDATE: invalid memory access via crafted MJPEG data
    - debian/patches/CVE-2014-8541.patch: check for pixel format changes in
    - CVE-2014-8541
  * SECURITY UPDATE: out of array access in ff_mjpeg_decode_sof
    - debian/patches/CVE-2015-1872.patch: check number of components in
    - CVE-2015-1872
  * SECURITY UPDATE: out of bounds array access in msrle_decode_pal4
    - debian/patches/CVE-2015-3395.patch: determine frame size in
    - CVE-2015-3395
  * SECURITY UPDATE: size issue in ff_h263_decode_picture_header
    - debian/patches/CVE-2015-5479.patch: check both dimensions in
    - CVE-2015-5479
  * SECURITY UPDATE: out of bounds array access in decode_ihdr_chunk
    - debian/patches/CVE-2015-6818.patch: only allow one IHDR chunk in
    - CVE-2015-6818
  * SECURITY UPDATE: out of bounds array access in ff_sbr_apply
    - debian/patches/CVE-2015-6820.patch: check that the element type
      matches in libavcodec/aacsbr.c, libavcodec/sbr.h.
    - CVE-2015-6820
  * SECURITY UPDATE: uninitialized memory access in sws_init_context
    - debian/patches/CVE-2015-6824.patch: clear buffers in
    - CVE-2015-6824
  * SECURITY UPDATE: invalid pointer use in ff_rv34_decode_init_thread_copy
    - debian/patches/CVE-2015-6826.patch: clear pointers in
    - CVE-2015-6826
  * SECURITY UPDATE: integer overflow in ff_ivi_init_planes
    - debian/patches/CVE-2015-8364.patch: check image dimensions in
    - CVE-2015-8364
  * SECURITY UPDATE: out of bounds array access in smka_decode_frame
    - debian/patches/CVE-2015-8365.patch: validate data size in
    - CVE-2015-8365
  * SECURITY UPDATE: cross-origin attack and arbitrary file read via the
    concat protocol
    - debian/confflags: disable concat protocol.
    - CVE-2016-1897
    - CVE-2016-1898
  * SECURITY UPDATE: integer overflow in asf_write_packet
    - debian/patches/CVE-2016-2326.patch: check pts in
    - CVE-2016-2326
  * SECURITY UPDATE: out of bounds array access via tga file
    - debian/patches/CVE-2016-2330.patch: fix lzw buffer size in
    - CVE-2016-2330

Date: 2016-04-01 14:21:13.857991+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
Signed-By: Ubuntu Archive Robot <cjwatson+ubuntu-archive-robot at chiark.greenend.org.uk>
-------------- next part --------------
Sorry, changesfile not available.

More information about the Precise-changes mailing list