touch-packages team mailing list archive
-
touch-packages team
-
Mailing list archive
-
Message #00686
[Bug 1341216] Re: Libav security fixes Jul 2014
This bug was fixed in the package libav - 4:0.8.13-0ubuntu0.12.04.1
---------------
libav (4:0.8.13-0ubuntu0.12.04.1) precise-security; urgency=medium
* Update to 0.8.13 to fix multiple security issues (LP: #1341216)
-- Marc Deslauriers <marc.deslauriers@xxxxxxxxxx> Tue, 15 Jul 2014 07:24:55 -0400
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libav in Ubuntu.
https://bugs.launchpad.net/bugs/1341216
Title:
Libav security fixes Jul 2014
Status in “libav” package in Ubuntu:
Fix Committed
Status in “libav” source package in Precise:
Fix Released
Status in “libav” source package in Saucy:
Fix Released
Status in “libav” source package in Trusty:
Fix Released
Status in “libav” source package in Utopic:
Fix Committed
Bug description:
trusty should get Libav 9.14:
version 9.14:
- adpcm: Write the proper predictor in trellis mode in IMA QT
- adpcm: Avoid reading out of bounds in the IMA QT trellis encoder
- Check mp3 header before calling avpriv_mpegaudio_decode_header() (bug/705)
- Check if an mp3 header is using a reserved sample rate
- lzo: Handle integer overflow (bug/704)
- avconv: make -shortest work with streamcopy
The lzo issue is claimed to be exploitable (remote code execution) on
i386.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libav/+bug/1341216/+subscriptions
References