Linux Security
    Linux Security
    Linux Security

    Debian: DSA-2336-1: ffmpeg security update

    Date
    149
    Posted By
    Multiple vulnerabilities were found in the ffmpeg, a multimedia player, server and encoder: CVE-2011-3362
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-2336-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                         Yves-Alexis Perez
    November 07, 2011                      https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : ffmpeg
    Vulnerability  : several
    Problem type   : remote
    Debian-specific: no
    CVE ID         : CVE-2011-3362 CVE-2011-3973 CVE-2011-3974 CVE-2011-3504
    Debian Bug     : 641478
    
    Multiple vulnerabilities were found in the ffmpeg, a multimedia player,
    server and encoder:
    
    CVE-2011-3362
    
        An integer signedness error in decode_residual_block function of 
        the Chinese AVS video (CAVS) decoder in libavcodec can lead to 
        denial of service (memory corruption and application crash) or 
        possible code execution via a crafted CAVS file.
    
    CVE-2011-3973/CVE-2011-3974
    
        Multiple errors in the Chinese AVS video (CAVS) decoder can lead to 
        denial of service (memory corruption and application crash) via an 
        invalid bitstream.
    
    CVE-2011-3504
    
        A memory allocation problem in the Matroska format decoder can lead 
        to code execution via a crafted file.
    
    For the stable distribution (squeeze), this problem has been fixed in
    version 4:0.5.5-1.
    
    For the unstable distribution (sid), this problem has been fixed in
    version 4:0.7.2-1 of the libav source package.
    
    Security support for ffmpeg has been discontinued for the oldstable
    distribution (lenny) before in DSA 2306.
    The current version in oldstable is not supported by upstream anymore
    and is affected by several security issues. Backporting fixes for these
    and any future issues has become unfeasible and therefore we needed to
    drop our security support for the version in oldstable.
    
    We recommend that you upgrade your ffmpeg packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    LinuxSecurity Poll

    Which aspect of server security are you most interested in learning more about?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/38-which-aspect-of-server-security-are-you-most-interested-in-learning-more-about?task=poll.vote&format=json
    38
    radio
    [{"id":"131","title":"Preventing information leakage","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"132","title":"Firewall considerations","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"133","title":"Permissions ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.