Description: The vulnerabilities are caused due to various errors within the 4xm, ADPCM IMA Electronic Arts EACS, ANM, Delphine Software International CIN, Electronic Arts CMV, PTX, QDM2, QuickDraw, TIFF, Tiertex Limited SEQ, aac, bink, flic, h264, indeo2, jpeg 2000, mpc v8, rasterfile, shorten, sun raster, vmd audio, vmd video, wmapro, wmavoice, and xan decoders, the 4X Technologies, Deluxe Paint Animation, avi, and avs demuxers, the libx264 interface to the x264 encoder, the unsharp filter, and the mov muxer, which can be exploited to e.g. cause NULL pointer dereferences, out-of-bounds reads and writes, double-frees, and buffer overflows via e.g. specially crafted media content. The vulnerabilities are reported in versions prior to 0.7.6 and 0.8.5. Solution: Update to version 0.7.6
(In reply to comment #0) > Description: > The vulnerabilities are caused due to various errors within the 4xm, ADPCM IMA > Electronic Arts EACS, ANM, Delphine Software International CIN, Electronic Arts > CMV, PTX, QDM2, QuickDraw, TIFF, Tiertex Limited SEQ, aac, bink, flic, h264, > indeo2, jpeg 2000, mpc v8, rasterfile, shorten, sun raster, vmd audio, vmd > video, wmapro, wmavoice, and xan decoders, the 4X Technologies, Deluxe Paint > Animation, avi, and avs demuxers, the libx264 interface to the x264 encoder, > the unsharp filter, and the mov muxer, which can be exploited to e.g. cause > NULL pointer dereferences, out-of-bounds reads and writes, double-frees, and > buffer overflows via e.g. specially crafted media content. > > The vulnerabilities are reported in versions prior to 0.7.6 and 0.8.5. > > Solution: > Update to version 0.7.6 This is from secunia security advisory at $URL
more on that here http://www.h-online.com/open/news/item/FFmpeg-updates-address-further-security-issues-1353568.html It is also worth noting that version 0.8.5 has gained new target with HE-AAC v2 encoding support http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=be1ae17ec0e03b494e0ab9f1eedefe83cebd7f4e;hp=cdb72c827c4fc3d8a2dfe939654fa885aaedbbd1
added 0.7.6 and 0.8.5 (In reply to comment #2) > It is also worth noting that version 0.8.5 has gained new target with HE-AAC v2 > encoding support added this in 0.8.5 only since 0.7.6 is the stable candidate
Thanks Alexis. Arches please test and mark stable: =media-video/ffmpeg-0.7.6 Target KEYWORDS : "alpha amd64 arm hppa ia64 ppc ppc64 sparc x86"
amd64 ok
amd64: emerges ok, has a test failure, Bug 385881. otherwise
(In reply to comment #6) > amd64: > > emerges ok, has a test failure, Bug 385881. otherwise Hmm, no test failures for me. + 06 Oct 2011; Steve Dibb <beandog@gentoo.org> ffmpeg-0.7.6.ebuild: + amd64 stable, bug 385511
In any cases, test failures does not block security bugs
Stable for HPPA.
x86 stable
ppc/ppc64 stable
arm stable
alpha/ia64/sparc stable
Thanks, everyone. Added to existing GLSA request.
CVE-2011-4364 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4364): Buffer overflow in the Sierra VMD decoder in libavcodec in FFmpeg 0.5.x before 0.5.7, 0.6.x before 0.6.4, 0.7.x before 0.7.9 and 0.8.x before 0.8.8; and in Libav 0.5.x before 0.5.6, 0.6.x before 0.6.4, and 0.7.x before 0.7.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VMD file, related to corrupted streams.
nothing left to do for media-video@
This issue was resolved and addressed in GLSA 201310-12 at http://security.gentoo.org/glsa/glsa-201310-12.xml by GLSA coordinator Sean Amoss (ackle).