lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20140917195431.GA5735@pisco.westfalen.local>
Date: Wed, 17 Sep 2014 21:54:32 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3027-1] libav security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3027-1                   security@...ian.org
http://www.debian.org/security/                        Moritz Muehlenhoff
September 17, 2014                     http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libav
CVE ID         : CVE-2013-7020

Several security issues have been corrected in multiple demuxers and 
decoders of the libav multimedia library. A full list of the changes is 
available at 
http://git.libav.org/?p=libav.git;a=blob;f=Changelog;hb=refs/tags/v0.8.15

For the stable distribution (wheezy), this problem has been fixed in
version 6:0.8.16-1.

For the testing distribution (jessie), this problem has been fixed in
version 6:11~alpha2-1.

For the unstable distribution (sid), this problem has been fixed in
version 6:11~alpha2-1.

We recommend that you upgrade your libav packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=+a8r
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ