~stefanlsd/mplayer/hardy

« back to all changes in this revision

Viewing changes to debian/changelog

  • Committer: Stefan Lesicnik
  • Date: 2008-10-27 12:53:32 UTC
  • Revision ID: stefan@lsd.co.za-20081027125332-0uzzff9tor3ms5mf
Fix for CVE-2008-3827 

Show diffs side-by-side

added added

removed removed

Lines of Context:
 
1
mplayer (2:1.0~rc2-0ubuntu13.1) hardy-security; urgency=low
 
2
 
 
3
  * SECURITY UPDATE: Multiple integer underflows in MPlayer 1.0_rc2 and
 
4
    earlier allow remote attackers to cause a denial of service
 
5
    (process termination) and possibly execute arbitrary code via a
 
6
    crafted video file that causes the stream_read function to read or
 
7
    write arbitrary memory. (LP: #279030)
 
8
    - libmpdemux/demux_real.c - patch from oCert.
 
9
    - References:
 
10
      + CVE-2008-3827
 
11
      + http://www.ocert.org/advisories/ocert-2008-013.html
 
12
 
 
13
 -- Stefan Lesicnik <stefan@lsd.co.za>  Wed, 08 Oct 2008 07:51:18 +0200
 
14
 
1
15
mplayer (2:1.0~rc2-0ubuntu13) hardy; urgency=low
2
16
 
3
17
  * SECURITY UPDATE: arbitrary code execution via crafted RTSP stream.