| Summary: | mplayer affected by new ffmpeg security issues | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | |
| Severity: | normal | ||
| Priority: | Normal | CC: | cjw, davidwhodgins, fundawang, mageia, sysadmin-bugs, tmb |
| Version: | 1 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Source RPM: | mplayer-1.0-1.rc4.0.r32713.5.2.mga1.src.rpm | CVE: | |
| Status comment: | |||
| Bug Depends on: | |||
| Bug Blocks: | 4146 | ||
|
Description
David Walser
2012-01-16 16:14:56 CET
David Walser
2012-01-16 16:15:26 CET
Blocks:
(none) =>
4146 Hi, thanks for reporting this bug. As there is no maintainer for this package I added the committers in CC. (Please set the status to 'assigned' if you are working on it) CC:
(none) =>
cjw, fundawang, mageia I bumped the subrel in Mageia 1 SVN and added the patches from the Ubuntu advisory, and they apply and build fine. We still need patches for CVE-2011-3892, CVE-2011-3893, and CVE-2011-3895 from ffmpeg 0.6.5 to be identified and applied before this is built and pushed. OK I rediffed the patches listed as relevant to these CVEs from here: http://git.videolan.org/?p=ffmpeg.git;a=log;h=refs/heads/release/0.6 and added them to Mageia 1 SVN. mplayer-1.0-1.rc4.0.r32713.5.3.mga1.src.rpm is built (including mplayer, mplayer-doc, mplayer-gui, and mencoder RPMs). It is ready for testing! Assignee:
bugsquad =>
qa-bugs Testing complete on i586 for the srpms mplayer-1.0-1.rc4.0.r32713.5.3.mga1.src.rpm mplayer-1.0-1.rc4.0.r32713.5.3.mga1.tainted.src.rpm Just testing that they work using gmplayer and lives, which uses mencoder to resize all of the frames in a flash video, and then save each frame as a png image. CC:
(none) =>
davidwhodgins Tested OK x86_64 Used gnome-mplayer and some mencoder lines from http://networkedblogs.com/8Pgo Confirmed tainted mencoder could encode with the xvidencopts line. David, could you summarise the changes in an advisory please. This can then be validated. Thankyou. Thanks Claire! Validating. Advisory: ======================== Updated mplayer packages fix security vulnerabilities: * CVE-2011-3504: denial of service and possible code execution via malformed Matroska file * CVE-2011-4351: denial of service and possible code execution via malformed file containing QDM2 stream * CVE-2011-4352: denial of service and possible code execution via malformed file containing VP3 stream * CVE-2011-4353: denial of service and possible code execution via malformed file containing VP5 or VP6 streams * CVE-2011-4364: denial of service and possible code execution via malformed VMD file * CVE-2011-4579: denial of service and possible code execution via malformed file containing svq1 stream * CVE-2011-3892: denial of service via malformed stream for the VP3 decoder * CVE-2011-3893, CVE-2011-3895: denial of service and possible code execution via malformed stream for the vorbis decoder and matroska demuxer References: http://bazaar.launchpad.net/~ubuntu-branches/ubuntu/maverick/ffmpeg/maverick-security/revision/54 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3892 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3893 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3895 ======================== Updated packages in core/updates_testing: ======================== mencoder-1.0-1.rc4.0.r32713.5.3.mga1 mplayer-1.0-1.rc4.0.r32713.5.3.mga1 mplayer-doc-1.0-1.rc4.0.r32713.5.3.mga1 mplayer-gui-1.0-1.rc4.0.r32713.5.3.mga1 from mplayer-1.0-1.rc4.0.r32713.5.3.mga1.src.rpm ======================== Could sysadmin please push from core/updates_testing to core/updates Thank you! Keywords:
(none) =>
validated_update update pushed Status:
NEW =>
RESOLVED Gah, comment #7 missed to point out the mplayer in tainted, so it was not pushed, and we got this: https://bugs.mageia.org/show_bug.cgi?id=4284 I have now pushed the tainted update. |