Mehrere Probleme in ming
ID: | FEDORA-2017-ed6b6a1d7a |
Distribution: | Fedora |
Plattformen: | Fedora 24 |
Datum: | Di, 18. April 2017, 22:36 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7578
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9828 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9829 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9831 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9827 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9265 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9264 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9266 |
Applikationen: | ming |
Originalnachricht |
|
-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2017-ed6b6a1d7a 2017-04-18 12:16:29.568993 -------------------------------------------------------------------------------- Name : ming Product : Fedora 24 Version : 0.4.8 Release : 1.fc24 URL : http://www.libming.org/ Summary : A library for generating Macromedia Flash files Description : Ming is a library for generating Macromedia Flash files (.swf), written in C, and includes useful utilities for working with .swf files. -------------------------------------------------------------------------------- Update Information: Release 0.4.8 (no ABI or API changes) * Add PHP7 compatibility * Fix C++ output of disassembler * Fix heap overflows in parser.c (CVE-2017-7578) * Avoid division by zero in listmp3 when no valid frame was found (CVE-2016-9265) * Don't try printing unknown block (CVE-2016-9828) * Parse Protect tag's Password as string (CVE-2016-9827) * Check values before deriving malloc parameters from them in parser.c (CVE-2016-9829) * Make readString() stop reading string past buffer's end * Return EOF when reading unsigned values hits end of memory backed buffer * Exit immediately when unexpected EOF is by fgetc() in utility programs (CVE-2016-9831) * Fix using EOF marker -1 value as a valid flag byte (CVE-2016-9266) * Fix division by zero sample rate due to global buffer overflow (CVE-2016-9264, CVE-2016-9265) -------------------------------------------------------------------------------- References: [ 1 ] Bug #1438687 - CVE-2016-9264 CVE-2016-9265 CVE-2016-9266 CVE-2016-9827 CVE-2016-9828 CVE-2016-9829 CVE-2016-9831 ming: Multiple security vulnerabilities [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1438687 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade ming' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org |