Name | CVE-2014-4610 |
Description | Integer overflow in the get_len function in libavutil/lzo.c in FFmpeg before 0.10.14, 1.1.x before 1.1.12, 1.2.x before 1.2.7, 2.0.x before 2.0.5, 2.1.x before 2.1.5, and 2.2.x before 2.2.4 allows remote attackers to execute arbitrary code via a crafted Literal Run. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
ffmpeg (PTS) | stretch (security) | 7:3.2.18-0+deb9u1 | fixed |
stretch (lts), stretch | 7:3.2.19-0+deb9u5 | fixed | |
buster, buster (lts) | 7:4.1.11-0+deb10u2 | fixed | |
buster (security) | 7:4.1.11-0+deb10u1 | fixed | |
bullseye | 7:4.3.7-0+deb11u1 | fixed | |
bullseye (security) | 7:4.3.8-0+deb11u1 | fixed | |
bookworm (security), bookworm | 7:5.1.6-0+deb12u1 | fixed | |
sid, trixie | 7:7.1-3 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
ffmpeg | source | squeeze | (unfixed) | end-of-life | ||
ffmpeg | source | (unstable) | 7:2.4.1-1 |
[squeeze] - ffmpeg <end-of-life> (Backports to 0.5.x not useful, too many checks missing)
Fixed in https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=d6af26c55c1ea30f85a7d9edbc373f53be1743ee