Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in libav
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in libav
ID: USN-2534-1
Distribution: Ubuntu
Plattformen: Ubuntu 12.04 LTS
Datum: Di, 17. März 2015, 16:43
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8542
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8543
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8544
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8547
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8548
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9604
Applikationen: libav

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============5959243678008933691==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="qQieHI7jXTcv03E2vqxp6l8Q6G87cgdlo"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--qQieHI7jXTcv03E2vqxp6l8Q6G87cgdlo
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-2534-1
March 17, 2015

libav vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 LTS

Summary:

Libav could be made to crash or run programs as your login if it opened a
specially crafted file.

Software Description:
- libav: Multimedia player, server, encoder and transcoder

Details:

It was discovered that Libav incorrectly handled certain malformed media
files. If a user were tricked into opening a crafted media file, an
attacker could cause a denial of service via application crash, or possibly
execute arbitrary code with the privileges of the user invoking the
program.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
libavcodec53 4:0.8.17-0ubuntu0.12.04.1
libavformat53 4:0.8.17-0ubuntu0.12.04.1

This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.

References:
http://www.ubuntu.com/usn/usn-2534-1
CVE-2014-8542, CVE-2014-8543, CVE-2014-8544, CVE-2014-8547,
CVE-2014-8548, CVE-2014-9604

Package Information:
https://launchpad.net/ubuntu/+source/libav/4:0.8.17-0ubuntu0.12.04.1



--qQieHI7jXTcv03E2vqxp6l8Q6G87cgdlo
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=uzNX
-----END PGP SIGNATURE-----

--qQieHI7jXTcv03E2vqxp6l8Q6G87cgdlo--


--===============5959243678008933691==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============5959243678008933691==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung