libav (6:11.12-1~deb8u4) jessie-security; urgency=high
authorMarkus Koschany <apo@debian.org>
Mon, 7 Jan 2019 18:45:12 +0000 (18:45 +0000)
committerMarkus Koschany <apo@debian.org>
Mon, 7 Jan 2019 18:45:12 +0000 (18:45 +0000)
commit3ed81a3c9a209e3b252fb43da42d95d057e56a34
tree42ff14efd5f34e16679bb4b249933fed826631b3
parent7a0e99ca9d9d63237d747911eeac64c4e2e582e1
parenta620fc4b3f99fd1de8ab2d5b9174470cbb182f06
libav (6:11.12-1~deb8u4) jessie-security; urgency=high

  * Non-maintainer upload by the LTS team.
  * Fix the following security vulnerabilities:
  * CVE-2017-14055: a DoS in mv_read_header() due to lack of an EOF (End of
    File) check might cause huge CPU and memory consumption.
  * CVE-2017-14056: a DoS in rl2_read_header() due to lack of an EOF (End of
    File) check might cause huge CPU and memory consumption.
  * CVE-2017-14057: a DoS in asf_read_marker() due to lack of an EOF (End of
    File) check might cause huge CPU and memory consumption.
  * CVE-2017-14170: a DoS in mxf_read_index_entry_array() due to lack of an EOF
    (End of File) check might cause huge CPU consumption.
  * CVE-2017-14171: a DoS in nsv_parse_NSVf_header() due to lack of an EOF (End
    of File) check might cause huge CPU consumption.
  * CVE-2017-14767: The sdp_parse_fmtp_config_h264 function in
    libavformat/rtpdec_h264.c mishandles empty sprop-parameter-sets values, which
    allows remote attackers to cause a denial of service (heap buffer overflow)
    or possibly have unspecified other impact via a crafted sdp file.
  * CVE-2017-15672: The read_header function in libavcodec/ffv1dec.c allows
    remote attackers to have unspecified impact via a crafted MP4 file, which
    triggers an out-of-bounds read.
  * CVE-2017-17130: The ff_free_picture_tables function in
    libavcodec/mpegpicture.c allows remote attackers to cause a denial of service
    (heap-based buffer overflow and application crash) or possibly have
    unspecified other impact via a crafted file, related to
    vc1_decode_i_blocks_adv.
  * CVE-2017-9993: Libav does not properly restrict HTTP Live Streaming
    filename extensions and demuxer names, which allows attackers to read
    arbitrary files via crafted playlist data.
  * CVE-2017-9994: libavcodec/webp.c in Libav before does not ensure that
    pix_fmt is set, which allows remote attackers to cause a denial of service
    (heap-based buffer overflow and application crash) or possibly have
    unspecified other impact via a crafted file, related to the
    vp8_decode_mb_row_no_filter and pred8x8_128_dc_8_c functions.
  * CVE-2018-14394: libavformat/movenc.c in Libav allows attackers to cause a
    denial of service (application crash caused by a divide-by-zero error) with a
    user crafted Waveform audio file.
  * CVE-2018-1999010: Libav contains multiple out of array access
    vulnerabilities in the mms protocol that can result in attackers accessing
    out of bound data.
  * CVE-2018-6621: The decode_frame function in libavcodec/utvideodec.c in
    Libav allows remote attackers to cause a denial of service (out of array
    read) via a crafted AVI file.
  * CVE-2018-7557: The decode_init function in libavcodec/utvideodec.c in
    Libav allows remote attackers to cause a denial of service (Out of array
    read) via an AVI file with crafted dimensions within chroma subsampling
    data.

[dgit import unpatched libav 6:11.12-1~deb8u4]
88 files changed:
debian/NEWS
debian/README.Debian
debian/README.source
debian/changelog
debian/clean
debian/compat
debian/confflags
debian/control
debian/copyright
debian/gbp.conf
debian/get_soname_version.sh
debian/libav-doc.doc-base
debian/libav-tools.install
debian/libav-tools.maintscript
debian/libavcodec-dev.examples
debian/libavcodec-dev.install.in
debian/libavcodec-extra-56.install.in
debian/libavcodec-extra-56.lintian-overrides
debian/libavcodec56.install.in
debian/libavcodec56.lintian-overrides
debian/libavdevice-dev.install.in
debian/libavdevice55.install.in
debian/libavdevice55.lintian-overrides
debian/libavfilter-dev.install.in
debian/libavfilter5.install.in
debian/libavfilter5.lintian-overrides
debian/libavformat-dev.install.in
debian/libavformat56.install.in
debian/libavformat56.lintian-overrides
debian/libavresample-dev.install.in
debian/libavresample2.install.in
debian/libavresample2.lintian-overrides
debian/libavutil-dev.install.in
debian/libavutil54.install.in
debian/libavutil54.lintian-overrides
debian/libswscale-dev.install.in
debian/libswscale3.install.in
debian/libswscale3.lintian-overrides
debian/patches/02-configure-disable-ebx-gcc-4.9.patch
debian/patches/03-disable-configuration-warnings.patch
debian/patches/CVE-2014-9317.patch
debian/patches/CVE-2015-6761.patch
debian/patches/CVE-2015-6818.patch
debian/patches/CVE-2015-6820.patch
debian/patches/CVE-2015-6821.patch
debian/patches/CVE-2015-6822.patch
debian/patches/CVE-2015-6823.patch
debian/patches/CVE-2015-6824.patch
debian/patches/CVE-2015-6825.patch
debian/patches/CVE-2015-6826.patch
debian/patches/CVE-2015-8216.patch
debian/patches/CVE-2015-8217.patch
debian/patches/CVE-2015-8363.patch
debian/patches/CVE-2015-8364.patch
debian/patches/CVE-2015-8661.patch
debian/patches/CVE-2015-8662.patch
debian/patches/CVE-2015-8663.patch
debian/patches/CVE-2016-10190-pre1-3668701f.patch
debian/patches/CVE-2016-10190-pre2-362c17e6.patch
debian/patches/CVE-2016-10190-pre3-strtoull.patch
debian/patches/CVE-2016-10190.patch
debian/patches/CVE-2016-10191.patch
debian/patches/CVE-2017-14055.patch
debian/patches/CVE-2017-14056.patch
debian/patches/CVE-2017-14057.patch
debian/patches/CVE-2017-14170.patch
debian/patches/CVE-2017-14171.patch
debian/patches/CVE-2017-14767.patch
debian/patches/CVE-2017-15672.patch
debian/patches/CVE-2017-17130.patch
debian/patches/CVE-2017-9993.patch
debian/patches/CVE-2017-9994.patch
debian/patches/CVE-2018-14394.patch
debian/patches/CVE-2018-1999010.patch
debian/patches/CVE-2018-6621.patch
debian/patches/CVE-2018-7557.patch
debian/patches/avio_feof.patch
debian/patches/series
debian/qt-faststart.1
debian/rebuild-scripts/README
debian/rebuild-scripts/do_all_safe
debian/rebuild-scripts/git_experimental_source
debian/rules
debian/source/format
debian/source/include-binaries
debian/source/lintian-overrides
debian/upstream-signing-key.pgp
debian/watch