Accepted: ffmpeg-free 3:0.svn20080206-8ubuntu2 (source)

Emanuele Gentili emgent at ubuntu.com
Tue Jul 15 13:20:42 BST 2008


Accepted:
 OK: ffmpeg-free_0.svn20080206.orig.tar.gz
 OK: ffmpeg-free_0.svn20080206-8ubuntu2.diff.gz
 OK: ffmpeg-free_0.svn20080206-8ubuntu2.dsc
     -> Component: main Section: libs

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Tue, 15 Jul 2008 13:18:33 +0200
Source: ffmpeg-free
Binary: ffmpeg ffmpeg-dbg libavutil49 libavcodec51 libavdevice52 libpostproc51 libavformat52 libswscale0 libavutil-dev libavcodec-dev libavdevice-dev libpostproc-dev libavformat-dev libswscale-dev
Architecture: source
Version: 3:0.svn20080206-8ubuntu2
Distribution: intrepid
Urgency: low
Maintainer: Reinhard Tartler <siretart at ubuntu.com>
Changed-By: Emanuele Gentili <emgent at ubuntu.com>
Description: 
 ffmpeg     - multimedia player, server and encoder
 ffmpeg-dbg - Debug symbols for ffmpeg related packages
 libavcodec-dev - development files for libavcodec
 libavcodec51 - ffmpeg codec library
 libavdevice-dev - development files for libavdevice
 libavdevice52 - ffmpeg device handling library
 libavformat-dev - development files for libavformat
 libavformat52 - ffmpeg file format library
 libavutil-dev - development files for libavutil
 libavutil49 - ffmpeg utility library
 libpostproc-dev - development files for libpostproc
 libpostproc51 - ffmpeg video postprocessing library
 libswscale-dev - development files for libswscale
 libswscale0 - ffmpeg video scaling library
Launchpad-Bugs-Fixed: 248674
Changes: 
 ffmpeg-free (3:0.svn20080206-8ubuntu2) intrepid; urgency=low
 .
   * SECURITY UPDATE: (LP: #248674)
    + debian/patches/20080715_CVE-2008-3162.diff:
     - Stack-based buffer overflow in the str_read_packet function in
       libavformat/psxstr.c in FFmpeg before r13993 allows remote attackers
       to cause a denial of service (application crash) or execute arbitrary
      code via a crafted STR file that interleaves audio and video sectors.
 .
   + References:
    - http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3162
    - https://roundup.mplayerhq.hu/roundup/ffmpeg/issue311
    - http://svn.mplayerhq.hu/ffmpeg?view=rev&revision=13993
 .
   + debian/control:
    - Update Standards Version.
Checksums-Sha1: 
 eeb44d5bca0e681932d0878871aedd494499bc6f 2573 ffmpeg-free_0.svn20080206-8ubuntu2.dsc
 19061e25292360ebe7cd373abefcc00211c73eea 25194 ffmpeg-free_0.svn20080206-8ubuntu2.diff.gz
Checksums-Sha256: 
 6ba78af5828fe0aa749b65eb50df1dc2a6b1c14358c9b93fdf73439993763d83 2573 ffmpeg-free_0.svn20080206-8ubuntu2.dsc
 f20c1bb5737b51957d26ec556deb8b748e0c745adde47f4f8326d34d3e8f4313 25194 ffmpeg-free_0.svn20080206-8ubuntu2.diff.gz
Files: 
 2a53cf63a47bfd5c201f293d589d6bf2 2573 libs optional ffmpeg-free_0.svn20080206-8ubuntu2.dsc
 4670f126013cdb8f717ae68bd6916ff7 25194 libs optional ffmpeg-free_0.svn20080206-8ubuntu2.diff.gz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
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=pdni
-----END PGP SIGNATURE-----





More information about the Intrepid-changes mailing list