Summary: | <media-video/ffmpeg-2.8.6: Multiple vulnerabilities (CVE-2016-{2213,2328,2329,2330}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Kristian Fiskerstrand (RETIRED) <k_f> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | aballier, media-video |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | A2 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Kristian Fiskerstrand (RETIRED)
2016-03-15 09:38:49 UTC
CVE-2016-2330 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2330): libavcodec/gif.c in FFmpeg before 2.8.6 does not properly calculate a buffer size, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via a crafted .tga file, related to the gif_image_write_image, gif_encode_init, and gif_encode_close functions. CVE-2016-2329 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2329): libavcodec/tiff.c in FFmpeg before 2.8.6 does not properly validate RowsPerStrip values and YCbCr chrominance subsampling factors, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via a crafted TIFF file, related to the tiff_decode_tag and decode_frame functions. CVE-2016-2328 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2328): libswscale/swscale_unscaled.c in FFmpeg before 2.8.6 does not validate certain height values, which allows remote attackers to cause a denial of service (out-of-bounds array read access) or possibly have unspecified other impact via a crafted .cine file, related to the bayer_to_rgb24_wrapper and bayer_to_yv12_wrapper functions. CVE-2016-2213 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2213): The jpeg2000_decode_tile function in libavcodec/jpeg2000dec.c in FFmpeg before 2.8.6 allows remote attackers to cause a denial of service (out-of-bounds array read access) via crafted JPEG 2000 data. we already have 2.8.5 stable, so let's go for 2.8.6 to fix this amd64 stable x86 stable ppc stable ppc64 stable Stable on alpha. arm stable Stable for HPPA. sparc stable ia64 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. Added to existing GLSA. This issue was resolved and addressed in GLSA 201606-09 at https://security.gentoo.org/glsa/201606-09 by GLSA coordinator Kristian Fiskerstrand (K_F). |