Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 25 Nov 2011 13:28:15 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Hanno Böck <hanno@...eck.de>
Subject: Re: CVE request: ffmpeg before 0.7.8 and 0.8.7  2
 buffer overflows and out-of-bounds read

On 11/23/2011 08:20 PM, Hanno Böck wrote:
> Am Wed, 23 Nov 2011 13:52:04 -0700
> schrieb Kurt Seifried <kseifried@...hat.com>:
>
>> On 11/23/2011 05:23 AM, Hanno Böck wrote:
>>> New ffmpeg releases contain a couple of security fixes:
>>> http://secunia.com/advisories/46888/
>>>
>>> 1) An error within the QDM2 decoder (libavcodec/qdm2.c) can be
>>> exploited to cause a buffer overflow.
>>>

Please use CVE-2011-4351 for this issue
>>> 2) An integer overflow error within the "vp3_dequant()" function
>>> (libavcodec/vp3.c) can be exploited to cause a buffer overflow.
>>>
Please use CVE-2011-4352 for this issue.

>>> 3) Errors within the "av_image_fill_pointers()", the
>>> "vp5_parse_coeff()", and the "vp6_parse_coeff()" functions can be
>>> exploited to trigger out-of-bounds reads.
>>>
>>>
Please use CVE-2011-4353 for this issue.

>>> Please assign CVEs.
>>>
>>>
>>> Maybe someone wants to have a look if other issues in those
>>> releases are security relevant:
>>> http://git.videolan.org/?p=ffmpeg.git&a=shortlog&h=n0.7.8
>>>
>> This would be the original advisory http://ffmpeg.org/#pr7dot8and8dot7
>> correct?
> It is the upstream confirmation - at least it's about the same bugs.
>


-- 

-Kurt Seifried / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.