libav 6:0.8.17-1 source package in Debian

Changelog

libav (6:0.8.17-1) wheezy-security; urgency=medium

  * New upstream release fixing multiple security issues.
    - utvideodec: Handle slice_height being zero (CVE-2014-9604)
    - tiff: Check that there is no aliasing in pixel format selection (CVE-2014-8544)
    - rmenc: limit packet size
    - eamad: check for out of bounds read (CID/1257500)
    - h264_cabac: Break infinite loops
    - matroskadec: Fix read-after-free in matroska_read_seek() (chromium/427266)
    - gifdec: refactor interleave end handling (CVE-2014-8547)
    - smc: fix the bounds check (CVE-2014-8548)
    - mmvideo: check frame dimensions (CVE-2014-8543)
    - jvdec: check frame dimensions (CVE-2014-8542)
    - mov: avoid a memleak when multiple stss boxes are present
    - apetag: Fix APE tag size check
    - x86: Only use optimizations with cmov if the CPU supports the instruction
    - x86: Add CPU flag for the i686 cmov instruction

 -- Sebastian Ramacher <email address hidden>  Sat, 14 Mar 2015 21:57:29 +0100

Upload details

Uploaded by:
Debian Multimedia Maintainers
Uploaded to:
Wheezy
Original maintainer:
Debian Multimedia Maintainers
Architectures:
any all
Section:
libs
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Builds

Downloads

File Size SHA-256 Checksum
libav_0.8.17-1.dsc 4.2 KiB 0207066bcb24d533141b654fc2ebed5cf01d04e6034f69e1e0e3e9939f6545fd
libav_0.8.17.orig.tar.gz 5.1 MiB 692da715af58373483b74d5eb3da43541a1c8b3f91fa079583c5c89445b3f764
libav_0.8.17-1.debian.tar.gz 45.8 KiB 782584e212c646389384a96818b4da021bf665163ed11ff6889d646aca03be8f

No changes file available.

Binary packages built by this source