Mehrere Probleme in FFmpeg
ID: | DSA-3996-1 |
Distribution: | Debian |
Plattformen: | Debian stretch |
Datum: | Mi, 11. Oktober 2017, 00:19 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14223
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14767 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14222 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14054 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14056 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14225 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14170 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14059 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14058 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14057 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14169 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14171 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14055 |
Applikationen: | FFmpeg |
Originalnachricht |
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3996-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff October 10, 2017 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : ffmpeg CVE ID : CVE-2017-14054 CVE-2017-14055 CVE-2017-14056 CVE-2017-14057 CVE-2017-14058 CVE-2017-14059 CVE-2017-14169 CVE-2017-14170 CVE-2017-14171 CVE-2017-14222 CVE-2017-14223 CVE-2017-14225 CVE-2017-14767 Several vulnerabilities have been discovered in the FFmpeg multimedia framework, which could result in denial of service or potentially the execution of arbitrary code if malformed Real, MV, RL2, ASF, Apple HLS, Phantom Cine, MXF, NSV, MOV or RTP H.264 files/streams are processed. For the stable distribution (stretch), these problems have been fixed in version 7:3.2.8-1~deb9u1. We recommend that you upgrade your ffmpeg packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlndHbsACgkQEMKTtsN8 TjYeVw/9FN2TvZK7EGX5m+ub03GdsSRpB/gFACuL+N8JapVaH+q0fXmPQQ8LC9zc MG0Ne4L6LDsjekpWgp5c56aH7gOjYSLEnfh3GcZpfswXI+HRhHQaVWoMy4dDqw07 IenPhvUvprTWKYb6HL4E8Tw6fkAIbXWZ0NVExfsL+1isyPq7Tu2wgVzGDLAmAuep Rsjm4zuhrMgT5v+Hsf626RGhghg8en0WHkHj4NYQ+INHXcc9fxm41l99Uewy5gA+ dKcnQ4vPFrWufx6SqfEZPOQ5T968oMmAH5YWOG+T6/hWi43QvpPmVOzMirs2H3tj mq7FjCBeoSB5bJSiYn95TaraEW7Ikn4PiQvitBwTizC5varIVj1+V8GebthhN4YA bSYc2L4IoT5JRE+5cVp1PoY/Qs45C1Bbp7UXJgqy7wtm/sVSuVFoZum4Y/ox5cI3 AVT+af33T3gMNQ6dMUzkHF4h9QEO39/+UO7QYOL79DTvAKjtsgjCA7/rGo4gb7hr 3w/zl/fnGE//TVbDAOYYkChibgY/6aJIkPYcnnGIIvLQb8aHQ1lmjIyvdxFrMmFR 45BfD12UrwOKq6RoUPloO5DEUCn7s2eX0s/qDh2oZm5y78aphmNOOh1uxWQoVH5a jyOrIbZLO3ckXKv/wJE0BxTIegPb8j1TmfnM90A/4Pvc8HMAvrY= =7NY4 -----END PGP SIGNATURE----- |