Debian Security Advisory
DLA-1611-2 libav -- LTS security update
- Date Reported:
- 21 Dec 2018
- Affected Packages:
- libav
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2015-6822, CVE-2015-6823, CVE-2015-6824.
- More information:
-
Two more security issues have been corrected in the libav multimedia library. This is a follow-up announcement for DLA-1611-1.
- CVE-2015-6823
The allocate_buffers function in libavcodec/alac.c did not initialize certain context data, which allowed remote attackers to cause a denial of service (segmentation violation) or possibly have unspecified other impact via crafted Apple Lossless Audio Codec (ALAC) data. This issues has now been addressed by clearing pointers in avcodec/alac.c's allocate_buffers().
Other than stated in debian/changelog of upload 6:11.12-1~deb8u2, this issue only now got fixed with upload of 6:11.12-1~deb8u3.
- CVE-2015-6824
The sws_init_context function in libswscale/utils.c did not initialize certain pixbuf data structures, which allowed remote attackers to cause a denial of service (segmentation violation) or possibly have unspecified other impact via crafted video data. In swscale/utils.c now these pix buffers get cleared which fixes use of uninitialized memory.
Other than stated in debian/changelog of upload 6:11.12-1~deb8u2, this issue only now got fixed with upload of 6:11.12-1~deb8u3.
For Debian 8
Jessie
, these problems have been fixed in version 6:11.12-1~deb8u3.We recommend that you upgrade your libav packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
- CVE-2015-6823