-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : libav Version : 6:0.8.18-0+deb7u1 CVE ID : CVE-2015-1872 CVE-2015-5479 CVE-2016-7393
Multiple vulnerabilities have been found in libav: CVE-2015-1872 The ff_mjpeg_decode_sof function in libavcodec/mjpegdec.c in Libav before 0.8.18 does not validate the number of components in a JPEG-LS Start Of Frame segment, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Motion JPEG data. CVE-2015-5479 The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions. CVE-2016-7393 The aac_sync function in libavcodec/aac_parser.c in Libav before 11.5 is vulnerable to a stack-based buffer overflow. For Debian 7 "Wheezy", these problems have been fixed in version 6:0.8.18-0+deb7u1. We recommend that you upgrade your libav packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJX9Cl1AAoJEKyQrD7FJAZeMuMQAKgY0GrUyy+sil9wrK/mNRkc fyH4zSGezjVe3IlmDxT1/swPtfA9IxKR1Sc5JUuz2ZQCnuVWx3OzW20q4l1EMGBU YgH1t/Ev+w1j8cL6uOJqaYmk09Ru3BKPZAnZOPAhmzTC7WLr1szauEzNucgFryoo E76TVC6s3gRcVfzQRxcod9EjaOmNfP8E2C+2h5kLSh8omoiBdWkdJUKpKWVSarzN ZCR8G+2pPIV/ydA6OOizDHuQVZ8IivGFgiVwaZ1a7OAyA8jJc6jU+RRHE6kH8m/3 RSrLPxNQzGkwI2gZv5AT9AcPIsr1nksHTifXl9pNuExG/a4cA3KdAfB3U4vdC7wO 4V9EvQsXoQz6HzpIhIjN33Qe3219iYC9YFGTnrjv+svqJgNCP3Yn+oNIYZHCrXSA qpnDkUKE7R1Gs+jFEMPs7dMrVWWkJTb5W5z/lvlRYlEvbAl6JALRd2IZgic4fnwK QG/y1MZOUoJywSF0/C1oopk62QR1Ppyxuk30c1HUhpHLc5zUWb22b7KuBju3wsP4 Fmy2SmOoMEb9NSNOTD+AjWJxvp1hw2Btav6Mekh446cnRfSazojYIeVw9gHRjk98 9L1dUblm0WFXaaxqthjh4TWVkB3Jx2rY0wuIEckXzrcZ8R4ED2M7qMSdeVmyFnlr voYLfanTLMpTgAvU2Gfd =Qf8O -----END PGP SIGNATURE-----