You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa libav

Sigurnosni nedostaci programskog paketa libav

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LDE

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

– ————————————————————————-
Debian Security Advisory DSA-3189-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
March 15, 2015 http://www.debian.org/security/faq
– ————————————————————————-

Package : libav
CVE ID : CVE-2014-7933 CVE-2014-8543 CVE-2014-8544 CVE-2014-8547
CVE-2014-8548 CVE-2014-9604

Several security issues have been corrected in multiple demuxers and
decoders of the libav multimedia library. A full list of the changes is
available at
http://git.libav.org/?p=libav.git;a=blob;f=Changelog;hb=refs/tags/v0.8.17

For the stable distribution (wheezy), these problems have been fixed in
version 6:0.8.17-1.

For the unstable distribution (sid), these problems have been fixed in
version 6:11.3-1.

We recommend that you upgrade your libav packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=BZpb
—–END PGP SIGNATURE—–


To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of “unsubscribe”. Trouble? Contact listmaster@lists.debian.org
Archive: https://lists.debian.org/20150315194938.GB20059@pisco.westfalen.local

AutorMarko Stanec
Cert idNCERT-REF-2015-03-0047-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Višestruke ranjivosti jezgre operacijskog sustava

Otkrivene su i otklonjene višestruke ranjivosti u raznim komponentama jezgre operacijskog sustava Mandriva Business Server 2.0. Ranjivosti zlonamjernim korisnicima omogućuju...

Close