Debian Security Advisory

DLA-2021-1 libav -- LTS security update

Date Reported:
05 Dec 2019
Affected Packages:
libav
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2017-17127, CVE-2017-18245, CVE-2018-19128, CVE-2018-19130, CVE-2019-14443, CVE-2019-17542.
More information:

Several security issues were fixed in libav, a multimedia library for processing audio and video files.

  • CVE-2017-17127

    The vc1_decode_frame function in libavcodec/vc1dec.c allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file.
    CVE-2018-19130 is a duplicate of this vulnerability.

  • CVE-2017-18245

    The mpc8_probe function in libavformat/mpc8.c allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted audio file on 32-bit systems.

  • CVE-2018-19128

    Heap-based buffer over-read in decode_frame in libavcodec/lcldec.c allows an attacker to cause denial-of-service via a crafted avi file.

  • CVE-2019-14443

    Division by zero in range_decode_culshift in libavcodec/apedec.c allows remote attackers to cause a denial of service (application crash), as demonstrated by avconv.

  • CVE-2019-17542

    Heap-based buffer overflow in vqa_decode_chunk because of an out-of-array access in vqa_decode_init in libavcodec/vqavideo.c.

For Debian 8 Jessie, these problems have been fixed in version 6:11.12-1~deb8u9.

We recommend that you upgrade your libav packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS