Mehrere Probleme in libav
ID: | USN-2534-1 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 12.04 LTS |
Datum: | Di, 17. März 2015, 16:43 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8542
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8543 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8544 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8547 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8548 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9604 |
Applikationen: | libav |
Originalnachricht |
|
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============5959243678008933691== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="qQieHI7jXTcv03E2vqxp6l8Q6G87cgdlo" This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --qQieHI7jXTcv03E2vqxp6l8Q6G87cgdlo Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-2534-1 March 17, 2015 libav vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 LTS Summary: Libav could be made to crash or run programs as your login if it opened a specially crafted file. Software Description: - libav: Multimedia player, server, encoder and transcoder Details: It was discovered that Libav incorrectly handled certain malformed media files. If a user were tricked into opening a crafted media file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 LTS: libavcodec53 4:0.8.17-0ubuntu0.12.04.1 libavformat53 4:0.8.17-0ubuntu0.12.04.1 This update uses a new upstream release, which includes additional bug fixes. In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2534-1 CVE-2014-8542, CVE-2014-8543, CVE-2014-8544, CVE-2014-8547, CVE-2014-8548, CVE-2014-9604 Package Information: https://launchpad.net/ubuntu/+source/libav/4:0.8.17-0ubuntu0.12.04.1 --qQieHI7jXTcv03E2vqxp6l8Q6G87cgdlo Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJVCDJiAAoJEGVp2FWnRL6TJhUP/3YN+XbdlTNthTWGzOcbWHqf kE3bwwdJllB8ptUygQrgkG0r+cU9vNfBYmo9kDFPiEhTUvmt87Hy6kuIJAOG88Uq qJ3WHXXqMXPtX7u4Ky/3utd3bruLXNAp//v8m2fEDGoLAOxag5W8wO/akEiWMacU jE0zl5AMh+JjfUH/shupUxeSKfCk0G4F2tavaJQ2Aa/H5h9iL6Bk7j3ByBZ+N50L 6Dh8SW2yRPaDfes3KbLGXzLUzGKtmpVhngi3/LxhCCVXk+aKQsenlXBH/MWQQdls RWDo0PVveua7f4nhgdlBu9H1ePuEHR2ZaR4NxYdXGyFRUgC+Te2d6vK0tSTkzBCc zXo/oCNjbvtaIhFjtVYu/e+TH8h+9J8XqFpz4TBUFypm6YhhXSSMSt9JUH7oC+h1 DSkqzjx3wRoYRiBOIhxsD5HgF2oG+5NqDXwxOO1wPWyRN0IREoBkywPIcswfrB7e F3AOgcTrrd8oU2gk4M2HXZlZhGp9dP9CHpSB09GvDopgT/dQG5rIQ/Bz6O3uxOP2 BZKMOp0jzbEuYpKm38l2DZSswEzbD//IG/0uUHmw1VsYvLirgS0SFqQ5Dzdr4mXn MKiRNY9Ulyx+Kg97v6ibM7sQa3p7mNQUB+EJIj5gnbaGHlcIYbhrhDklvh0JmgZD 162wzJqPl0CCj8dRjZjc =uzNX -----END PGP SIGNATURE----- --qQieHI7jXTcv03E2vqxp6l8Q6G87cgdlo-- --===============5959243678008933691== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce --===============5959243678008933691==-- |