[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1841-1] gpac security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : gpac
Version        : 0.5.0+svn5324~dfsg1-1+deb8u4
CVE ID         : CVE-2019-12481 CVE-2019-12482 CVE-2019-12483


Three issues have been found for gpac, an Open Source multimedia framework. Two of them are NULL pointer dereferences and one of them is a heap-based buffer overflow.


For Debian 8 "Jessie", these problems have been fixed in version
0.5.0+svn5324~dfsg1-1+deb8u4.

We recommend that you upgrade your gpac packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEEYgH7/9u94Hgi6ruWlvysDTh7WEcFAl0ZHpBfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDYy
MDFGQkZGREJCREUwNzgyMkVBQkI5Njk2RkNBQzBEMzg3QjU4NDcACgkQlvysDTh7
WEdR2A//XUEtR/ZcdfihA3HKp4CcQ06zbBT40YgQ4GrfT3A1Ij7D1O2I+jfakzkX
BioM4qbXBPVRajG58XCg9XPEFI34mKrBnHnh0ZFQ3D5BhiVHNwIDDp+xqdb18ErI
jkqOpR3XsIMYe0GrURCZzKF0mYpzIyrg35FGNxGlFZvaX10xWWKclpEpI4S3oYiB
xPGL+11H6OCF+t+1g7j2nuEfJ8U+A6gyGlauU2+bs/UbaIRJ0x9kWi9SLpsbHy/g
eTYl+9Eo+FWU5ZOrgHQ/w/mMi1ktHhvLroH5kHuSoeZP2JuT47BRMlWkqKzTuyE7
Lsyq4wiuzrpc4gKYMK2h1P8Grh7N8+15wQe6b1c5mzWePHr9rFzeByynN3jXp7qZ
E7l5t78Bq2FGqfpefdYtz70S6d0ctiyBsq7XNDwoT+4MZD7EqVOsgyLDjMX4SYtY
HvN1im+fjmqmJyUbzTCUPQ3fW7D6K6cyiOl/v8DdGnc1AnlUfPSTTh+iVDtt/Dlr
HL0gZ3w2hn55Q6Ts0L4sjSXSJIw7QNr3qK9BFMqElu7P0RsPMaihfA2KpktJgRM6
zxury6CgGCfghs/xUdM/GM0zrzmGloOifg0lXyUvvKB7MdqqrpP+GIZ8BlLLGPCI
jiSANbN/bdckbFw6OeyPiwdkmwH1Yey4LaVQzaRB3FQ0u6CocS0=
=iYwJ
-----END PGP SIGNATURE-----


Reply to: