Your message dated Tue, 01 Feb 2011 07:40:58 +0100
with message-id <>
and subject line Re: Bug#610550: [CVE-2011-0480] memory corruptions in the 
ffmpeg Vorbis codec
has caused the Debian Bug report #610550,
regarding [CVE-2011-0480] memory corruptions in the ffmpeg Vorbis codec
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact

Debian Bug Tracking System
Contact with problems
--- Begin Message ---
Package: ffmpeg
Severity: important
Tags: security patch

the following CVE (Common Vulnerabilities & Exposures) id was
published for ffmpeg.

| Multiple buffer overflows in the Vorbis decoder in Google Chrome
| before 8.0.552.237 and Chrome OS before 8.0.552.344 allow remote
| attackers to cause a denial of service or possibly have unspecified
| other impact via unknown vectors.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

In upstream the report is [1]. The proposed patch is [2].

For further information see:




--- End Message ---
--- Begin Message ---
On Tue, Feb 01, 2011 at 03:15:33 (CET), Michael Gilbert wrote:

> notfound 610550 4:0.5.2-6
> tag 610550 -unreproducible
> thanks
> it looks like you're using a newer svn version of ffmpeg.  at least
> 0.5.2 in unstable doesn't yet support webm, so it isn't affected.  i
> haven't checked 0.6.1 in experimental.

I did and it doesn't crash for me.

With this rationale, I'm closing this bug for now, but by all means,
please reopen it as soon as you have a testcase for me.

Reinhard Tartler, KeyID 945348A4

--- End Message ---
pkg-multimedia-maintainers mailing list

Reply via email to