MGASA-2024-0283

Source
https://advisories.mageia.org/MGASA-2024-0283.html
Import Source
https://advisories.mageia.org/MGASA-2024-0283.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2024-0283
Related
Published
2024-09-09T19:00:01Z
Modified
2024-09-09T18:35:35Z
Summary
Updated ffmpeg packages fix security vulnerabilities
Details

A vulnerability was found in FFmpeg up to 7.0.1. It has been classified as critical. This affects the function pnmdecodeframe in the library /libavcodec/pnmdec.c. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. (CVE-2024-7055) A vulnerability, which was classified as critical, was found in FFmpeg up to 5.1.5. This affects the function fill_audiodata of the file /libswresample/swresample.c. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. (CVE-2024-7272)

References
Credits

Affected packages

Mageia:9 / ffmpeg

Package

Name
ffmpeg
Purl
pkg:rpm/mageia/ffmpeg?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.1.6-1.mga9.tainted

Ecosystem specific

{
    "section": "tainted"
}

Mageia:9 / ffmpeg

Package

Name
ffmpeg
Purl
pkg:rpm/mageia/ffmpeg?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.1.6-1.mga9

Ecosystem specific

{
    "section": "core"
}