lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20180717204147.GA21617@pisco.westfalen.local>
Date: Tue, 17 Jul 2018 22:41:47 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4249-1] ffmpeg security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4249-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
July 17, 2018                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : ffmpeg
CVE ID         : CVE-2018-6392 CVE-2018-6621 CVE-2018-7557 CVE-2018-10001 
                 CVE-2018-12458 CVE-2018-13300 CVE-2018-13302

Several vulnerabilities have been discovered in the FFmpeg multimedia
framework, which could result in denial of service or potentially the
execution of arbitrary code if malformed files/streams are processed.
		       
For the stable distribution (stretch), these problems have been fixed in
version 7:3.2.11-1~deb9u1.

We recommend that you upgrade your ffmpeg packages.

For the detailed security status of ffmpeg please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/ffmpeg

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=j/Rw
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ