Gentoo Linux Security Advisory 201502-8 - Multiple vulnerabilities have been found in Libav, allowing attackers to execute arbitrary code or cause Denial of Service. Versions less than 9.17 are affected.
8b25111daeecad86d923dea6ab62f2ab11b37e8fde0d7e62cded8470639bf721
Debian Linux Security Advisory 2977-1 - Don A. Baley discovered an integer overflow in the lzo compression handler which could result in the execution of arbitrary code.
dce2e0982e9e32c64fd9ff9a35dba981f45ad2490ece8da6e288347f46190911
Mandriva Linux Security Advisory 2014-129 - Multiple unspecified vulnerabilities in libavcodec/wmalosslessdec.c in FFmpeg before 0.11 have unknown impact and attack vectors related to in decode_ac_filter, and (3) too many bits in decode_channel_residues(). libavcodec/wmalosslessdec.c in FFmpeg before 2.1.4 uses an incorrect data-structure size for certain coefficients, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted WMA data. The msrle_decode_frame function in libavcodec/msrle.c in FFmpeg before 2.1.4 does not properly calculate line sizes, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted Microsoft RLE video data. The mpegts_write_pmt function in the MPEG2 transport stream muxer in FFmpeg, possibly 2.1 and earlier, allows remote attackers to have unspecified impact and vectors, which trigger an out-of-bounds write. A use-after-free vulnerability in FFmpeg before 1.1.9 involving seek operations on video data could allow remote attackers to cause a denial of service. An integer overflow can occur when processing any variant of a literal run in the av_lzo1x_decode function. The updated packages have been upgraded to the 0.10.14 version which is not vulnerable to these issues.
0d1423a8c293a7b3ed8e22c74767c7d36ece268539bb64306d44d9068ac1f91b