------------------------------------------------------------------------- Debian LTS Advisory DLA-2291-1 debian-...@lists.debian.org https://www.debian.org/lts/security/ July 27, 2020 https://wiki.debian.org/LTS -------------------------------------------------------------------------
Package : ffmpeg Version : 7:3.2.15-0+deb9u1 CVE ID : CVE-2019-13390 CVE-2019-17542 CVE-2020-13904 Debian Bug : Several vulnerabilities have been fixed by upgrading FFmpeg, a widely used multimedia framework, from 3.2.14 to 3.2.15. CVE-2019-13390 rawenc: Only accept the appropriate stream type for raw muxers. CVE-2019-17542 Heap-based buffer overflow in vqa_decode_chunk. CVE-2020-13904 Use-after-free via a crafted EXTINF duration in an m3u8 file. For Debian 9 stretch, these problems have been fixed in version 7:3.2.15-0+deb9u1. Several other bugs are also fixed in 3.2.15, a full list of changes is available at https://git.ffmpeg.org/gitweb/ffmpeg.git/blob/37a8ad9a3167923d500910031a8086489c004d83:/Changelog We recommend that you upgrade your ffmpeg packages. For the detailed security status of ffmpeg please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ffmpeg Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
signature.asc
Description: PGP signature