Name | CVE-2016-1898 |
Description | FFmpeg 2.x allows remote attackers to conduct cross-origin attacks and read arbitrary files by using the subfile protocol in an HTTP Live Streaming (HLS) M3U8 file, leading to an external HTTP request in which the URL string contains an arbitrary line of a local file. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-3506-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
ffmpeg (PTS) | stretch (security) | 7:3.2.18-0+deb9u1 | fixed |
| stretch (lts), stretch | 7:3.2.19-0+deb9u5 | fixed |
| buster, buster (lts) | 7:4.1.11-0+deb10u2 | fixed |
| buster (security) | 7:4.1.11-0+deb10u1 | fixed |
| bullseye | 7:4.3.7-0+deb11u1 | fixed |
| bullseye (security) | 7:4.3.8-0+deb11u1 | fixed |
| bookworm (security), bookworm | 7:5.1.6-0+deb12u1 | fixed |
| sid, trixie | 7:7.1-3 | fixed |
libav (PTS) | jessie, jessie (lts) | 6:11.12-1~deb8u9 | fixed |
The information below is based on the following data on fixed versions.
Notes
[squeeze] - ffmpeg <end-of-life> (Not supported in Squeeze LTS)
http://habrahabr.ru/company/mailru/blog/274855
Fixed in 2.8.5 upstream