This bug was fixed in the package libav - 6:0.8.8-0ubuntu0.13.10.1 --------------- libav (6:0.8.8-0ubuntu0.13.10.1) saucy-security; urgency=low
* Update to 0.8.8 to fix multiple security issues (LP: #1242802) -- Marc Deslauriers <[email protected]> Mon, 21 Oct 2013 13:37:07 -0400 ** Changed in: libav (Ubuntu Saucy) Status: Confirmed => Fix Released ** Changed in: libav (Ubuntu Raring) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to libav in Ubuntu. https://bugs.launchpad.net/bugs/1242802 Title: July 2013 libav security tracking bug Status in “libav” package in Ubuntu: Confirmed Status in “libav” source package in Precise: Fix Released Status in “libav” source package in Quantal: Fix Released Status in “libav” source package in Raring: Fix Released Status in “libav” source package in Saucy: Fix Released Status in “libav” source package in Trusty: Confirmed Bug description: This is a bug to track the July 2013 libav security updates: - kmvc: Clip pixel position to valid range - kmvc: use fixed sized arrays in the context - indeo: use a typedef for the mc function pointer - lavc: check for overflow in init_get_bits - mjpegdec: properly report unsupported disabled features - jpegls: return meaningful errors - jpegls: factorize return paths - jpegls: check the scan offset - wavpack: validate samples size parsed in wavpack_decode_block - ljpeg: use the correct number of components in yuv - mjpeg: Validate sampling factors - mjpegdec: validate parameters in mjpeg_decode_scan_progressive_ac - wavpack: check packet size early - wavpack: return meaningful errors - apetag: use int64_t for filesize - tiff: do not overread the source buffer - Prepare for 0.8.8 Release - smacker: fix an off by one in huff.length computation - smacker: check the return value of smacker_decode_tree - smacker: pad the extradata allocation - smacker: check frame size validity - vmdav: convert to bytestream2 - 4xm: don't rely on get_buffer() initializing the frame. - 4xm: check the return value of read_huffman_tables(). - 4xm: use the correct logging context - 4xm: reject frames not compatible with the declared version - 4xm: check bitstream_size boundary before using it - 4xm: do not overread the source buffer in decode_p_block To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libav/+bug/1242802/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : [email protected] Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp

