{"id":"MGASA-2014-0281","summary":"Updated ffmpeg packages fix security vulnerabilities","details":"A use-after-free vulnerability in FFmpeg before 1.1.9 involving seek\noperations on video data could allow remote attackers to cause a denial\nof service (CVE-2012-5150).\n\nThe tak_decode_frame function in libavcodec/takdec.c in FFmpeg before\n1.1.9 does not properly validate a certain bits-per-sample value, which\nallows remote attackers to cause a denial of service (out-of-bounds array\naccess) or possibly have unspecified other impact via crafted TAK (aka\nTom's lossless Audio Kompressor) data (CVE-2014-2097).\n\nlibavcodec/wmalosslessdec.c in FFmpeg before 1.1.9 uses an incorrect\ndata-structure size for certain coefficients, which allows remote\nattackers to cause a denial of service (memory corruption) or possibly\nhave unspecified other impact via crafted WMA data (CVE-2014-2098).\n\nThe msrle_decode_frame function in libavcodec/msrle.c in FFmpeg before\n1.1.9 does not properly calculate line sizes, which allows remote\nattackers to cause a denial of service (out-of-bounds array access) or\npossibly have unspecified other impact via crafted Microsoft RLE video\ndata (CVE-2014-2099).\n\nThe mpegts_write_pmt function in the MPEG2 transport stream (aka DVB)\nmuxer (libavformat/mpegtsenc.c) in FFmpeg before 1.1.9 allows remote\nattackers to have unspecified impact and vectors, which trigger an\nout-of-bounds write (CVE-2014-2263).\n\nAn integer overflow in LZO decompression in FFmpeg before 1.1.12 allows\nremote attackers to have an unspecified impact by embedding compressed\ndata in a video file (CVE-2014-4610).\n\nThis updates provides ffmpeg version 1.1.12, which fixes these issues\nand several other bugs which were corrected upstream.\n","modified":"2026-01-31T02:58:42.476080Z","published":"2014-07-04T18:22:12Z","related":["CVE-2012-5150","CVE-2014-2097","CVE-2014-2098","CVE-2014-2099","CVE-2014-2263","CVE-2014-4610"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2014-0281.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=13595"},{"type":"REPORT","url":"http://git.videolan.org/?p=ffmpeg.git;a=log;h=n1.1.12"},{"type":"REPORT","url":"http://ffmpeg.org/olddownload.html"},{"type":"REPORT","url":"http://ffmpeg.org/security.html"},{"type":"REPORT","url":"http://openwall.com/lists/oss-security/2014/06/26/23"}],"affected":[{"package":{"name":"ffmpeg","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/ffmpeg?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.1.12-1.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0281.json"}},{"package":{"name":"ffmpeg","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/ffmpeg?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.1.12-1.mga3.tainted"}]}],"ecosystem_specific":{"section":"tainted"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0281.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}