File _patchinfo of Package patchinfo.39217
<patchinfo incident="39217">
<issue tracker="cve" id="2024-36618"/>
<issue tracker="cve" id="2024-36617"/>
<issue tracker="cve" id="2024-36616"/>
<issue tracker="bnc" id="1234018">VUL-0: CVE-2024-36616: ffmpeg,ffmpeg-4: An integer overflow in the component /libavformat/westwood_vqa.c of FFmpeg n6.1.1 allows attackers to cause a denial of service in the application via a crafted VQA file.</issue>
<issue tracker="bnc" id="1234019">VUL-0: CVE-2024-36617: ffmpeg,ffmpeg-4: FFmpeg n6.1.1 has an integer overflow vulnerability in the FFmpeg CAF decoder.</issue>
<issue tracker="bnc" id="1234020">VUL-0: CVE-2024-36618: ffmpeg,ffmpeg-4: FFmpeg n6.1.1 has a vulnerability in the AVI demuxer of the libavformat library which allows for an integer overflow, potentially resulting in a denial-of-service (DoS) condition.</issue>
<packager>qzhao</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for ffmpeg-4</summary>
<description>This update for ffmpeg-4 fixes the following issues:
- CVE-2024-36618: Fixed integer overflow iff ULONG_MAX < INT64_MAX (bsc#1234020).
New CVE references, fixed in previous release:
- CVE-2024-36617: avformat/cafdec: dont seek beyond 64bit (bsc#1234019).
- CVE-2024-36616: avformat/westwood_vqa: Fix 2g packets (bsc#1234018).
</description>
</patchinfo>