* SECURITY UPDATE: denial of service via a malformed Ogg Media (OGM) file
- debian/patches/100_security_CVE-2008-4610.diff: properly check return
codes in libavcodec/vp3.c.
- CVE-2008-4610
* SECURITY UPDATE: buffer overflow caused by an incorrect DCA_MAX_FRAME_SIZE
value
- debian/patches/101_security_CVE-2008-4867.diff: set DCA_MAX_FRAME_SIZE to
a correct value in libavcodec/dca.c.
- CVE-2008-4867
* SECURITY UPDATE: arbitrary code execution via a malformed 4X movie file
(LP: #323620)
- debian/patches/102_security_CVE-2009-0385.diff: validate current_track
value in libavformat/4xm.c.
- CVE-2009-0385
-- Marc Deslauriers <email address hidden> Fri, 13 Mar 2009 13:20:07 -0400
This bug was fixed in the package ffmpeg - 3:0.cvs20070307 -5ubuntu4. 2
--------------- 7-5ubuntu4. 2) gutsy-security; urgency=low
ffmpeg (3:0.cvs2007030
* SECURITY UPDATE: denial of service via a malformed Ogg Media (OGM) file patches/ 100_security_ CVE-2008- 4610.diff: properly check return patches/ 101_security_ CVE-2008- 4867.diff: set DCA_MAX_FRAME_SIZE to patches/ 102_security_ CVE-2009- 0385.diff: validate current_track
- debian/
codes in libavcodec/vp3.c.
- CVE-2008-4610
* SECURITY UPDATE: buffer overflow caused by an incorrect DCA_MAX_FRAME_SIZE
value
- debian/
a correct value in libavcodec/dca.c.
- CVE-2008-4867
* SECURITY UPDATE: arbitrary code execution via a malformed 4X movie file
(LP: #323620)
- debian/
value in libavformat/4xm.c.
- CVE-2009-0385
-- Marc Deslauriers <email address hidden> Fri, 13 Mar 2009 13:20:07 -0400