-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/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=ZYFL
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1790-1
April 04, 2013
libav vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.10
- Ubuntu 12.04 LTS
Summary:
Libav could be made to crash or run programs as your login if it opened a
specially crafted file.
Software Description:
- libav: Multimedia player, server, encoder and transcoder
Details:
It was discovered that Libav incorrectly handled certain malformed media
files. If a user were tricked into opening a crafted media file, an
attacker could cause a denial of service via application crash, or possibly
execute arbitrary code with the privileges of the user invoking the
program.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.10:
libavcodec53 6:0.8.6-0ubuntu0.12.10.1
libavformat53 6:0.8.6-0ubuntu0.12.10.1
Ubuntu 12.04 LTS:
libavcodec53 4:0.8.6-0ubuntu0.12.04.1
libavformat53 4:0.8.6-0ubuntu0.12.04.1
This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.
References:
http://www.ubuntu.com/usn/usn-1790-1
CVE-2013-0894, CVE-2013-2277, CVE-2013-2495, CVE-2013-2496
Package Information:
https://launchpad.net/ubuntu/+source/libav/6:0.8.6-0ubuntu0.12.10.1
https://launchpad.net/ubuntu/+source/libav/4:0.8.6-0ubuntu0.12.04.1
No comments:
Post a Comment