Debian Security Advisory
DLA-1907-1 libav -- LTS security update
- Date Reported:
- 30 Sep 2019
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2017-9987, CVE-2018-5766, CVE-2018-11102, CVE-2019-14372, CVE-2019-14442.
- More information:
Several security issues have been corrected in multiple demuxers and decoders of the libav multimedia library.
In Libav, there was a heap-based buffer overflow in the function hpel_motion in mpegvideo_motion.c. A crafted input could have lead to a remote denial of service attack.
In Libav there was an invalid memcpy in the av_packet_ref function of libavcodec/avpacket.c. Remote attackers could have leveraged this vulnerability to cause a denial of service (segmentation fault) via a crafted avi file.
A read access violation in the mov_probe function in libavformat/mov.c allowed remote attackers to cause a denial of service (application crash), as demonstrated by avconv.
In Libav, there was an infinite loop in the function wv_read_block_header() in the file wvdec.c.
In mpc8_read_header in libavformat/mpc8.c, an input file could have resulted in an avio_seek infinite loop and hang, with 100% CPU consumption. Attackers could have leveraged this vulnerability to cause a denial of service via a crafted file.
For Debian 8
Jessie, these problems have been fixed in version 6:11.12-1~deb8u8.
We recommend that you upgrade your libav packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS