This bug was fixed in the package libav - 6:0.8.8-0ubuntu0.13.10.1

---------------
libav (6:0.8.8-0ubuntu0.13.10.1) saucy-security; urgency=low

  * Update to 0.8.8 to fix multiple security issues (LP: #1242802)
 -- Marc Deslauriers <[email protected]>   Mon, 21 Oct 2013 13:37:07 
-0400

** Changed in: libav (Ubuntu Saucy)
       Status: Confirmed => Fix Released

** Changed in: libav (Ubuntu Raring)
       Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to libav in Ubuntu.
https://bugs.launchpad.net/bugs/1242802

Title:
  July 2013 libav security tracking bug

Status in “libav” package in Ubuntu:
  Confirmed
Status in “libav” source package in Precise:
  Fix Released
Status in “libav” source package in Quantal:
  Fix Released
Status in “libav” source package in Raring:
  Fix Released
Status in “libav” source package in Saucy:
  Fix Released
Status in “libav” source package in Trusty:
  Confirmed

Bug description:
  This is a bug to track the July 2013 libav security updates:

  - kmvc: Clip pixel position to valid range
  - kmvc: use fixed sized arrays in the context
  - indeo: use a typedef for the mc function pointer
  - lavc: check for overflow in init_get_bits
  - mjpegdec: properly report unsupported disabled features
  - jpegls: return meaningful errors
  - jpegls: factorize return paths
  - jpegls: check the scan offset
  - wavpack: validate samples size parsed in wavpack_decode_block
  - ljpeg: use the correct number of components in yuv
  - mjpeg: Validate sampling factors
  - mjpegdec: validate parameters in mjpeg_decode_scan_progressive_ac
  - wavpack: check packet size early
  - wavpack: return meaningful errors
  - apetag: use int64_t for filesize
  - tiff: do not overread the source buffer
  - Prepare for 0.8.8 Release
  - smacker: fix an off by one in huff.length computation
  - smacker: check the return value of smacker_decode_tree
  - smacker: pad the extradata allocation
  - smacker: check frame size validity
  - vmdav: convert to bytestream2
  - 4xm: don't rely on get_buffer() initializing the frame.
  - 4xm: check the return value of read_huffman_tables().
  - 4xm: use the correct logging context
  - 4xm: reject frames not compatible with the declared version
  - 4xm: check bitstream_size boundary before using it
  - 4xm: do not overread the source buffer in decode_p_block

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libav/+bug/1242802/+subscriptions

-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to