[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: Re: [oss-security] CVE request: ffmpeg before 0.7.8 and 0.8.7 2
From: Kurt Seifried <kseifried () redhat ! com>
Date: 2011-11-25 20:28:15
Message-ID: 4ECFFA5F.2010800 () redhat ! com
[Download RAW message or body]
On 11/23/2011 08:20 PM, Hanno Böck wrote:
> Am Wed, 23 Nov 2011 13:52:04 -0700
> schrieb Kurt Seifried <kseifried@redhat.com>:
>
>> On 11/23/2011 05:23 AM, Hanno Böck wrote:
>>> New ffmpeg releases contain a couple of security fixes:
>>> http://secunia.com/advisories/46888/
>>>
>>> 1) An error within the QDM2 decoder (libavcodec/qdm2.c) can be
>>> exploited to cause a buffer overflow.
>>>
Please use CVE-2011-4351 for this issue
>>> 2) An integer overflow error within the "vp3_dequant()" function
>>> (libavcodec/vp3.c) can be exploited to cause a buffer overflow.
>>>
Please use CVE-2011-4352 for this issue.
>>> 3) Errors within the "av_image_fill_pointers()", the
>>> "vp5_parse_coeff()", and the "vp6_parse_coeff()" functions can be
>>> exploited to trigger out-of-bounds reads.
>>>
>>>
Please use CVE-2011-4353 for this issue.
>>> Please assign CVEs.
>>>
>>>
>>> Maybe someone wants to have a look if other issues in those
>>> releases are security relevant:
>>> http://git.videolan.org/?p=ffmpeg.git&a=shortlog&h=n0.7.8
>>>
>> This would be the original advisory http://ffmpeg.org/#pr7dot8and8dot7
>> correct?
> It is the upstream confirmation - at least it's about the same bugs.
>
--
-Kurt Seifried / Red Hat Security Response Team
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic