[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1WFS9l-0001Gc-Ac@titan.mandriva.com>
Date: Mon, 17 Feb 2014 18:39:01 +0100
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2014:037 ] ffmpeg
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2014:037
http://www.mandriva.com/en/support/security/
_______________________________________________________________________
Package : ffmpeg
Date : February 17, 2014
Affected: Business Server 1.0, Enterprise Server 5.0
_______________________________________________________________________
Problem Description:
Updated ffmpeg packages fix security vulnerabilities:
This updates provides ffmpeg version 0.5.13 and 0.10.11, which fixes
several unspecified security vulnerabilities and other bugs which
were corrected upstream.
_______________________________________________________________________
References:
http://www.ffmpeg.org/security.html
http://git.videolan.org/?p=ffmpeg.git;a=log;h=n0.5.13
http://git.videolan.org/?p=ffmpeg.git;a=log;h=n0.10.11
http://advisories.mageia.org/MGASA-2014-0065.html
_______________________________________________________________________
Updated Packages:
Mandriva Enterprise Server 5:
7742b0588624f60c376be19b4d89a8fd mes5/i586/ffmpeg-0.5.13-0.1mdvmes5.2.i586.rpm
c14a0eb8817bae066df5373687b5d0d6 mes5/i586/libavformats52-0.5.13-0.1mdvmes5.2.i586.rpm
9ecf8648a04938937a8faea452f6d497 mes5/i586/libavutil49-0.5.13-0.1mdvmes5.2.i586.rpm
c458420fb9e790aa41d8abf748692c2e mes5/i586/libffmpeg52-0.5.13-0.1mdvmes5.2.i586.rpm
eced4907f2997e3f4ca5d1dee2b62016 mes5/i586/libffmpeg-devel-0.5.13-0.1mdvmes5.2.i586.rpm
72bb5e239cafa24058549dea4bdc8f49 mes5/i586/libffmpeg-static-devel-0.5.13-0.1mdvmes5.2.i586.rpm
7ecee41b7b2815b0823bbbba8658ca06 mes5/i586/libpostproc51-0.5.13-0.1mdvmes5.2.i586.rpm
12d20764ba57fbf71ee9654a4eb64d3f mes5/i586/libswscaler0-0.5.13-0.1mdvmes5.2.i586.rpm
6e96bd5abc38a8a8f58a196af556f806 mes5/SRPMS/ffmpeg-0.5.13-0.1mdvmes5.2.src.rpm
Mandriva Enterprise Server 5/X86_64:
1624df142a467f3a3de4955dd810a1ce mes5/x86_64/ffmpeg-0.5.13-0.1mdvmes5.2.x86_64.rpm
d60b7b155f3ae1f90232ecd32ab5d391 mes5/x86_64/lib64avformats52-0.5.13-0.1mdvmes5.2.x86_64.rpm
595dab63bbec115366304d565b86aeb1 mes5/x86_64/lib64avutil49-0.5.13-0.1mdvmes5.2.x86_64.rpm
adabce9fedc7086f039626437b7a8004 mes5/x86_64/lib64ffmpeg52-0.5.13-0.1mdvmes5.2.x86_64.rpm
1816cb6946b0f3548c0c424858c51340 mes5/x86_64/lib64ffmpeg-devel-0.5.13-0.1mdvmes5.2.x86_64.rpm
9466173717a6bb74ac05aff1baf255a8 mes5/x86_64/lib64ffmpeg-static-devel-0.5.13-0.1mdvmes5.2.x86_64.rpm
b6eb83c3ee6aebf979475f85bffde920 mes5/x86_64/lib64postproc51-0.5.13-0.1mdvmes5.2.x86_64.rpm
52fbf256d72995e157a1cbacf70a4218 mes5/x86_64/lib64swscaler0-0.5.13-0.1mdvmes5.2.x86_64.rpm
6e96bd5abc38a8a8f58a196af556f806 mes5/SRPMS/ffmpeg-0.5.13-0.1mdvmes5.2.src.rpm
Mandriva Business Server 1/X86_64:
9264f9935448582010c136761e90550c mbs1/x86_64/ffmpeg-0.10.11-1.mbs1.x86_64.rpm
ff6207bacb56aac2f6a298c2bde79b33 mbs1/x86_64/lib64avcodec53-0.10.11-1.mbs1.x86_64.rpm
3b9202057b4f48eb3d3c4a7041af79ae mbs1/x86_64/lib64avfilter2-0.10.11-1.mbs1.x86_64.rpm
02eb33c9845ffd1bb85f01689e5f7831 mbs1/x86_64/lib64avformat53-0.10.11-1.mbs1.x86_64.rpm
63ef87449b5f5941b503fed7b81444f6 mbs1/x86_64/lib64avutil51-0.10.11-1.mbs1.x86_64.rpm
9adeeb722da49ad90998df4070f284e0 mbs1/x86_64/lib64ffmpeg-devel-0.10.11-1.mbs1.x86_64.rpm
cd2e95670c3f87abca0601de3f89e53b mbs1/x86_64/lib64ffmpeg-static-devel-0.10.11-1.mbs1.x86_64.rpm
339ee84802d8662336596cbac58eee43 mbs1/x86_64/lib64postproc52-0.10.11-1.mbs1.x86_64.rpm
98ee40b039272a3e2fc8b13c59c530ff mbs1/x86_64/lib64swresample0-0.10.11-1.mbs1.x86_64.rpm
beaa3a178f877b0b2122ec8f24261448 mbs1/x86_64/lib64swscaler2-0.10.11-1.mbs1.x86_64.rpm
a0c84e846e09588c4194ec665745b984 mbs1/SRPMS/ffmpeg-0.10.11-1.mbs1.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFTAh1DmqjQ0CJFipgRAsDrAJ0WKhyBoo611fOC5M8yN9qqcPD3rACeJ7jz
m+V0nwlGpKVgBHjhe1cjYdk=
=xoRs
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists