-
Committer:
Lionel Le Folgoc
-
Date:
2010-05-01 15:10:51 UTC
-
Revision ID:
mrpouit@ubuntu.com-20100501151051-sq97vj00q9hjcsxu
* Merged from Ubuntu, remaining Medibuntu changes:
- debian/rules: enable DEB_BUILD_OPTIONS=risky
- debian/control: add "risky" Build-Depends (liblame-dev, libfaad2-dev,
libfaac-dev, libxvidcore-dev, libx264-dev)
- debian/control: update description to clearly warn people this package
comes from us.
- Enable amr support:
+ debian/rules: enable amr_nb and amr_wb in confflags for support of amr
(Adaptative MultiRate)
+ debian/rules: download needed sources for amr support on buils target
+ debian/control: update description to add the amr support warning
+ debian/patents.txt: add an explanation about the AMR audio compression
format.
- Enable a52 support:
+ debian/control: b-d on liba52-dev
+ debian/rules: pass --enable-liba52.
- Add Vcs-* field
- debian/patches/999_faadbin_fix_dynamic_linking.diff: use proper naming
for faad 2.5+. LP: #225060
* debian/control: update our Vcs-* fields.
* debian/patches/CVE-2009-46XX/security-issue22.patch: removed this
patch as it was causing a regression. (LP: #567913)
* SECURITY UPDATE: Fix a multitude of security issues
- debian/patches/CVE-2009-46XX/security-issue03.patch: check stream
existence before assignment
- debian/patches/CVE-2009-46XX/security-issue04.patch: check submap
indexes
- debian/patches/CVE-2009-46XX/security-issue05.patch: check classbook
value
- debian/patches/CVE-2009-46XX/security-issue06.patch: add checks for
per-packet mode indexes and per-header mode mapping indexes
- debian/patches/CVE-2009-46XX/security-issue07.patch: check masterbook
index and subclass book index.
- debian/patches/CVE-2009-46XX/security-issue08.patch: check
res_setup->books
- debian/patches/CVE-2009-46XX/security-issue09.patch: check
begin/end/partition_size
- debian/patches/CVE-2009-46XX/security-issue10.patch: check validity
of channels & samplerate
- debian/patches/CVE-2009-46XX/security-issue11.patch: fix book_idx
check
- debian/patches/CVE-2009-46XX/security-issue12.patch: sanity checks
for magnitude and angle
- debian/patches/CVE-2009-46XX/security-issue13.patch: fix = -> == typo
- debian/patches/CVE-2009-46XX/security-issue14.patch: check dimensions
against 0 too
- debian/patches/CVE-2009-46XX/security-issue17.patch: make sure that
all memory allocations succeed
- debian/patches/CVE-2009-46XX/security-issue19.patch: set data_size to
0 to avoid having it uninitialized
- debian/patches/CVE-2009-46XX/security-issue22.patch: check codec_id
and codec_type, make sure priv_data is freed and codec is set to NULL
- CVE-2009-4633
- CVE-2009-4634
- CVE-2009-4635
- CVE-2009-4637
- CVE-2009-4639
- CVE-2009-4640