Your message dated Wed, 06 Dec 2006 13:32:04 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#401311: fixed in gstreamer0.10-ffmpeg 0.10.1-3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: gstreamer0.8-ffmpeg
Severity: grave
Tags: security
Justification: user security hole


According to

http://secunia.com/advisories/22202/

gstreamer0.8-ffmpeg is vulnerable to an ffmpeg buffer overflow and
gstreamer0.8-ffmpeg does not seem to link dynamically against the ffmpeg in
Debian. You should try to link against ffmpeg dynamically if possible.

Please mention the CVE id in the changelog.


--- End Message ---
--- Begin Message ---
Source: gstreamer0.10-ffmpeg
Source-Version: 0.10.1-3

We believe that the bug you reported is fixed in the latest version of
gstreamer0.10-ffmpeg, which is due to be installed in the Debian FTP archive:

gstreamer0.10-ffmpeg_0.10.1-3.diff.gz
  to pool/main/g/gstreamer0.10-ffmpeg/gstreamer0.10-ffmpeg_0.10.1-3.diff.gz
gstreamer0.10-ffmpeg_0.10.1-3.dsc
  to pool/main/g/gstreamer0.10-ffmpeg/gstreamer0.10-ffmpeg_0.10.1-3.dsc
gstreamer0.10-ffmpeg_0.10.1-3_i386.deb
  to pool/main/g/gstreamer0.10-ffmpeg/gstreamer0.10-ffmpeg_0.10.1-3_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Loic Minier <[EMAIL PROTECTED]> (supplier of updated gstreamer0.10-ffmpeg 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed,  6 Dec 2006 14:15:19 +0100
Source: gstreamer0.10-ffmpeg
Binary: gstreamer0.10-ffmpeg
Architecture: source i386
Version: 0.10.1-3
Distribution: unstable
Urgency: low
Maintainer: Maintainers of GStreamer packages <[EMAIL PROTECTED]>
Changed-By: Loic Minier <[EMAIL PROTECTED]>
Description: 
 gstreamer0.10-ffmpeg - FFmpeg plugin for GStreamer
Closes: 401311
Changes: 
 gstreamer0.10-ffmpeg (0.10.1-3) unstable; urgency=low
 .
   * New patch, 20_CVE-2006-4800-4xm-buffer-overflow, fixes buffer overflow in
     4XM code; CVE-2006-4800; thanks Andreas Barth; closes: #401311.
Files: 
 98c835eca93c79abfe3b21023fe219a0 918 libs optional 
gstreamer0.10-ffmpeg_0.10.1-3.dsc
 f411cd83a73dc3abc66422d44f0782a7 7956 libs optional 
gstreamer0.10-ffmpeg_0.10.1-3.diff.gz
 dba2c8bff9b680dbab9727b80b654aa5 1228964 libs optional 
gstreamer0.10-ffmpeg_0.10.1-3_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFdsSC4VUX8isJIMARAoZ+AJ9Mew4RGJHWLpfYcWFs8VZjC6xdJQCgn4//
gaVXvS5+bM7TDndMDRO3cJ4=
=5Yue
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to