[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[ MDVSA-2014:037 ] ffmpeg



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2014:037
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : ffmpeg
 Date    : February 17, 2014
 Affected: Business Server 1.0, Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 Updated ffmpeg packages fix security vulnerabilities:
 
 This updates provides ffmpeg version 0.5.13 and 0.10.11, which fixes
 several unspecified security vulnerabilities and other bugs which
 were corrected upstream.
 _______________________________________________________________________

 References:

 http://www.ffmpeg.org/security.html
 http://git.videolan.org/?p=ffmpeg.git;a=log;h=n0.5.13
 http://git.videolan.org/?p=ffmpeg.git;a=log;h=n0.10.11
 http://advisories.mageia.org/MGASA-2014-0065.html
 _______________________________________________________________________

 Updated Packages:

 Mandriva Enterprise Server 5:
 7742b0588624f60c376be19b4d89a8fd  mes5/i586/ffmpeg-0.5.13-0.1mdvmes5.2.i586.rpm
 c14a0eb8817bae066df5373687b5d0d6  mes5/i586/libavformats52-0.5.13-0.1mdvmes5.2.i586.rpm
 9ecf8648a04938937a8faea452f6d497  mes5/i586/libavutil49-0.5.13-0.1mdvmes5.2.i586.rpm
 c458420fb9e790aa41d8abf748692c2e  mes5/i586/libffmpeg52-0.5.13-0.1mdvmes5.2.i586.rpm
 eced4907f2997e3f4ca5d1dee2b62016  mes5/i586/libffmpeg-devel-0.5.13-0.1mdvmes5.2.i586.rpm
 72bb5e239cafa24058549dea4bdc8f49  mes5/i586/libffmpeg-static-devel-0.5.13-0.1mdvmes5.2.i586.rpm
 7ecee41b7b2815b0823bbbba8658ca06  mes5/i586/libpostproc51-0.5.13-0.1mdvmes5.2.i586.rpm
 12d20764ba57fbf71ee9654a4eb64d3f  mes5/i586/libswscaler0-0.5.13-0.1mdvmes5.2.i586.rpm 
 6e96bd5abc38a8a8f58a196af556f806  mes5/SRPMS/ffmpeg-0.5.13-0.1mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 1624df142a467f3a3de4955dd810a1ce  mes5/x86_64/ffmpeg-0.5.13-0.1mdvmes5.2.x86_64.rpm
 d60b7b155f3ae1f90232ecd32ab5d391  mes5/x86_64/lib64avformats52-0.5.13-0.1mdvmes5.2.x86_64.rpm
 595dab63bbec115366304d565b86aeb1  mes5/x86_64/lib64avutil49-0.5.13-0.1mdvmes5.2.x86_64.rpm
 adabce9fedc7086f039626437b7a8004  mes5/x86_64/lib64ffmpeg52-0.5.13-0.1mdvmes5.2.x86_64.rpm
 1816cb6946b0f3548c0c424858c51340  mes5/x86_64/lib64ffmpeg-devel-0.5.13-0.1mdvmes5.2.x86_64.rpm
 9466173717a6bb74ac05aff1baf255a8  mes5/x86_64/lib64ffmpeg-static-devel-0.5.13-0.1mdvmes5.2.x86_64.rpm
 b6eb83c3ee6aebf979475f85bffde920  mes5/x86_64/lib64postproc51-0.5.13-0.1mdvmes5.2.x86_64.rpm
 52fbf256d72995e157a1cbacf70a4218  mes5/x86_64/lib64swscaler0-0.5.13-0.1mdvmes5.2.x86_64.rpm 
 6e96bd5abc38a8a8f58a196af556f806  mes5/SRPMS/ffmpeg-0.5.13-0.1mdvmes5.2.src.rpm

 Mandriva Business Server 1/X86_64:
 9264f9935448582010c136761e90550c  mbs1/x86_64/ffmpeg-0.10.11-1.mbs1.x86_64.rpm
 ff6207bacb56aac2f6a298c2bde79b33  mbs1/x86_64/lib64avcodec53-0.10.11-1.mbs1.x86_64.rpm
 3b9202057b4f48eb3d3c4a7041af79ae  mbs1/x86_64/lib64avfilter2-0.10.11-1.mbs1.x86_64.rpm
 02eb33c9845ffd1bb85f01689e5f7831  mbs1/x86_64/lib64avformat53-0.10.11-1.mbs1.x86_64.rpm
 63ef87449b5f5941b503fed7b81444f6  mbs1/x86_64/lib64avutil51-0.10.11-1.mbs1.x86_64.rpm
 9adeeb722da49ad90998df4070f284e0  mbs1/x86_64/lib64ffmpeg-devel-0.10.11-1.mbs1.x86_64.rpm
 cd2e95670c3f87abca0601de3f89e53b  mbs1/x86_64/lib64ffmpeg-static-devel-0.10.11-1.mbs1.x86_64.rpm
 339ee84802d8662336596cbac58eee43  mbs1/x86_64/lib64postproc52-0.10.11-1.mbs1.x86_64.rpm
 98ee40b039272a3e2fc8b13c59c530ff  mbs1/x86_64/lib64swresample0-0.10.11-1.mbs1.x86_64.rpm
 beaa3a178f877b0b2122ec8f24261448  mbs1/x86_64/lib64swscaler2-0.10.11-1.mbs1.x86_64.rpm 
 a0c84e846e09588c4194ec665745b984  mbs1/SRPMS/ffmpeg-0.10.11-1.mbs1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFTAh1DmqjQ0CJFipgRAsDrAJ0WKhyBoo611fOC5M8yN9qqcPD3rACeJ7jz
m+V0nwlGpKVgBHjhe1cjYdk=
=xoRs
-----END PGP SIGNATURE-----