Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 484842 (CVE-2013-0869) - media-video/ffmpeg: "field_end()" Denial of Service Vulnerability (CVE-2013-0869)
Summary: media-video/ffmpeg: "field_end()" Denial of Service Vulnerability (CVE-2013-0...
Status: RESOLVED FIXED
Alias: CVE-2013-0869
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://secunia.com/advisories/54826/
Whiteboard: B3 [noglsa/cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2013-09-14 07:00 UTC by Agostino Sarubbo
Modified: 2015-08-04 15:33 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-09-14 07:00:15 UTC
From ${URL} :

Description

A vulnerability has been reported in FFmpeg, which can be exploited by malicious people to cause a 
DoS (Denial of Service) in an application using the library.

For more information:
SA52093 (#8)

The vulnerability is reported in versions prior to 0.11.4.


Solution:
Update to version 0.11.4.

Original Advisory:
http://ffmpeg.org/security.html


@maintainer(s): after the bump, in case we need to stabilize the package, please say explicitly if it is ready for the stabilization or not.
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2013-11-27 10:14:10 UTC
CVE-2013-0869 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0869):
  The field_end function in libavcodec/h264.c in FFmpeg before 1.1.2 allows
  remote attackers to have an unspecified impact via crafted H.264 data,
  related to an SPS and slice mismatch and an out-of-bounds array access.
Comment 2 Alexis Ballier gentoo-dev 2015-02-15 10:52:41 UTC
http://ffmpeg.org/security.html lists 1.1.2 and 0.11.4 as fixing this; current stable 1.2.6 is unaffected.
Comment 3 Yury German Gentoo Infrastructure gentoo-dev 2015-02-15 13:54:46 UTC
With the verification, going to cleanup directly. Two version needs cleanup:
1.0.10, 0.10.15
Maintainer(s),  Please drop the vulnerable versions.

Security please vote on GLSA. 
GLSA Vote: No
Comment 4 Alexis Ballier gentoo-dev 2015-02-15 16:54:15 UTC
(In reply to Yury German from comment #3)
> With the verification, going to cleanup directly. Two version needs cleanup:
> 1.0.10, 0.10.15
> Maintainer(s),  Please drop the vulnerable versions.

have you checked that nothing depends on these slots ?
Comment 5 Kristian Fiskerstrand (RETIRED) gentoo-dev 2015-02-15 17:05:15 UTC
(In reply to Alexis Ballier from comment #4)
> (In reply to Yury German from comment #3)
> > With the verification, going to cleanup directly. Two version needs cleanup:
> > 1.0.10, 0.10.15
> > Maintainer(s),  Please drop the vulnerable versions.
> 
> have you checked that nothing depends on these slots ?

That would be part of the maintainer's responsibility. 

If packages in fact depend on versions expected to be vulnerable fixed would have to be backported to them.

GLSA Vote: No
Comment 6 Yury German Gentoo Infrastructure gentoo-dev 2015-07-01 13:26:13 UTC
Maintainer(s), please drop the vulnerable version(s).
Comment 7 Yury German Gentoo Infrastructure gentoo-dev 2015-08-04 15:33:27 UTC
Maintainer(s), Thank you for you for cleanup.

Thank you all. Closing as noglsa.