libav (6:11.12-1~deb8u9) jessie-security; urgency=high
authorSylvain Beucler <beuc@debian.org>
Thu, 5 Dec 2019 16:27:00 +0000 (16:27 +0000)
committerSylvain Beucler <beuc@debian.org>
Thu, 5 Dec 2019 16:27:00 +0000 (16:27 +0000)
commitc4353d8f9e807998e1d6c6fc699c0f505c232e91
tree1877503c650460ef832aa870b00e987430954b9e
parent7a0e99ca9d9d63237d747911eeac64c4e2e582e1
parent2dd5ba288d921b129796eac6ab165740bdeef5d9
libav (6:11.12-1~deb8u9) jessie-security; urgency=high

  * Non-maintainer upload by the LTS Security Team.
  * CVE-2019-17542: heap-based buffer overflow in vqa_decode_chunk because
    of an out-of-array access in vqa_decode_init in libavcodec/vqavideo.c.
  * CVE-2019-14443: division by zero in range_decode_culshift in
    libavcodec/apedec.c allows remote attackers to cause a denial of
    service (application crash), as demonstrated by avconv.
  * CVE-2018-19128: heap-based buffer over-read in decode_frame in
    libavcodec/lcldec.c that allows an attacker to cause denial-of-service
    via a crafted avi file.
  * CVE-2017-17127: the vc1_decode_frame function in libavcodec/vc1dec.c
    allows remote attackers to cause a denial of service (NULL pointer
    dereference and application crash) via a crafted file.
    CVE-2018-19130 is a duplicate of this vulnerability.
  * CVE-2017-18245: the mpc8_probe function in libavformat/mpc8.c allows
    remote attackers to cause a denial of service (heap-based buffer
    over-read) via a crafted audio file on 32-bit systems.

[dgit import unpatched libav 6:11.12-1~deb8u9]
115 files changed:
debian/NEWS
debian/README.Debian
debian/README.source
debian/changelog
debian/clean
debian/compat
debian/confflags
debian/control
debian/copyright
debian/gbp.conf
debian/get_soname_version.sh
debian/libav-doc.doc-base
debian/libav-tools.install
debian/libav-tools.maintscript
debian/libavcodec-dev.examples
debian/libavcodec-dev.install.in
debian/libavcodec-extra-56.install.in
debian/libavcodec-extra-56.lintian-overrides
debian/libavcodec56.install.in
debian/libavcodec56.lintian-overrides
debian/libavdevice-dev.install.in
debian/libavdevice55.install.in
debian/libavdevice55.lintian-overrides
debian/libavfilter-dev.install.in
debian/libavfilter5.install.in
debian/libavfilter5.lintian-overrides
debian/libavformat-dev.install.in
debian/libavformat56.install.in
debian/libavformat56.lintian-overrides
debian/libavresample-dev.install.in
debian/libavresample2.install.in
debian/libavresample2.lintian-overrides
debian/libavutil-dev.install.in
debian/libavutil54.install.in
debian/libavutil54.lintian-overrides
debian/libswscale-dev.install.in
debian/libswscale3.install.in
debian/libswscale3.lintian-overrides
debian/patches/02-configure-disable-ebx-gcc-4.9.patch
debian/patches/03-disable-configuration-warnings.patch
debian/patches/CVE-2014-8542.patch
debian/patches/CVE-2014-9317.patch
debian/patches/CVE-2015-1207.patch
debian/patches/CVE-2015-1872.patch
debian/patches/CVE-2015-6761.patch
debian/patches/CVE-2015-6818.patch
debian/patches/CVE-2015-6820.patch
debian/patches/CVE-2015-6821.patch
debian/patches/CVE-2015-6822.patch
debian/patches/CVE-2015-6823.patch
debian/patches/CVE-2015-6824.patch
debian/patches/CVE-2015-6825.patch
debian/patches/CVE-2015-6826.patch
debian/patches/CVE-2015-8216.patch
debian/patches/CVE-2015-8217.patch
debian/patches/CVE-2015-8363.patch
debian/patches/CVE-2015-8364.patch
debian/patches/CVE-2015-8661.patch
debian/patches/CVE-2015-8662.patch
debian/patches/CVE-2015-8663.patch
debian/patches/CVE-2016-10190-pre1-3668701f.patch
debian/patches/CVE-2016-10190-pre2-362c17e6.patch
debian/patches/CVE-2016-10190-pre3-strtoull.patch
debian/patches/CVE-2016-10190.patch
debian/patches/CVE-2016-10191.patch
debian/patches/CVE-2017-10001.patch
debian/patches/CVE-2017-1000460.patch
debian/patches/CVE-2017-14055.patch
debian/patches/CVE-2017-14056.patch
debian/patches/CVE-2017-14057.patch
debian/patches/CVE-2017-14058.patch
debian/patches/CVE-2017-14169.patch
debian/patches/CVE-2017-14170.patch
debian/patches/CVE-2017-14171.patch
debian/patches/CVE-2017-14223.patch
debian/patches/CVE-2017-14767.patch
debian/patches/CVE-2017-15672.patch
debian/patches/CVE-2017-17127.patch
debian/patches/CVE-2017-17130.patch
debian/patches/CVE-2017-18245.patch
debian/patches/CVE-2017-7863.patch
debian/patches/CVE-2017-7865.patch
debian/patches/CVE-2017-9987-1.patch
debian/patches/CVE-2017-9987-2.patch
debian/patches/CVE-2017-9993.patch
debian/patches/CVE-2017-9994.patch
debian/patches/CVE-2018-11102-1.patch
debian/patches/CVE-2018-11102-2.patch
debian/patches/CVE-2018-14394.patch
debian/patches/CVE-2018-15822.patch
debian/patches/CVE-2018-19128.patch
debian/patches/CVE-2018-1999010.patch
debian/patches/CVE-2018-1999012.patch
debian/patches/CVE-2018-5766.patch
debian/patches/CVE-2018-6392-1.patch
debian/patches/CVE-2018-6392-2.patch
debian/patches/CVE-2018-6621.patch
debian/patches/CVE-2018-7557.patch
debian/patches/CVE-2019-11338.patch
debian/patches/CVE-2019-14372.patch
debian/patches/CVE-2019-14442.patch
debian/patches/CVE-2019-14443.patch
debian/patches/CVE-2019-17542.patch
debian/patches/avio_feof.patch
debian/patches/series
debian/qt-faststart.1
debian/rebuild-scripts/README
debian/rebuild-scripts/do_all_safe
debian/rebuild-scripts/git_experimental_source
debian/rules
debian/source/format
debian/source/include-binaries
debian/source/lintian-overrides
debian/upstream-signing-key.pgp
debian/watch