After being in contact with upstream, I received a non-public exploit.

This exploit was run against Intrepid, Hardy, Gutsy, Feisty and Dapper
and caused the application to segfault.

[12013.368559] faad[9750]: segfault at 9758000 ip 0804bed3 sp bfba6d50
error 4 in faad[8048000+6000]

After applying the fix, the same exploit was run and the application
exited successfully without segfaulting.

This is a minor patch, created by upstream, and no regressions or
functionality problems were detected.

-- 
[CVE-2008-4201] faad2 2.6.1 - Heap-based buffer overflow in the decodeMP4file 
function and possibly execute arbitrary code via a crafted MPEG-4 (MP4) file
https://bugs.launchpad.net/bugs/277110
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to