CVE-2013-2496 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2496): The msrle_decode_8_16_24_32 function in msrledec.c in libavcodec in FFmpeg through 1.1.3 does not properly determine certain end pointers, which allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted Microsoft RLE data. CVE-2013-2495 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2495): The iff_read_header function in iff.c in libavformat in FFmpeg through 1.1.3 does not properly handle data sizes for Interchange File Format (IFF) data during operations involving a CMAP chunk or a video codec, which allows remote attackers to cause a denial of service (integer overflow, out-of-bounds array access, and application crash) or possibly have unspecified other impact via a crafted header. CVE-2013-2277 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2277): The ff_h264_decode_seq_parameter_set function in h264_ps.c in libavcodec in FFmpeg before 1.1.3 does not validate the relationship between luma depth and chroma depth, which allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted H.264 data. CVE-2013-2276 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2276): The avcodec_decode_audio4 function in utils.c in libavcodec in FFmpeg before 1.1.3 does not verify the decoding state before proceeding with certain skip operations, which allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted audio data. I couldn't find these in any bug, but for that matter I'm not sure if they're relevant. @maintainers: does this affect 1.0.7?
http://ffmpeg.org/security.html lists 1.1.3 and 1.1.4 as fixing these; current stable 1.2.6 is thus unaffected
With the verification, going to cleanup directly. Two version needs cleanup: 1.0.10, 0.10.15 Maintainer(s), Please drop the vulnerable versions. Security please vote on GLSA. GLSA Vote: No
GLSA Vote: No Marking noglsa
Maintainer(s), please drop the vulnerable version(s).
Maintainer(s), Thank you for you for cleanup. Thank you all. Closing as noglsa.