Mandriva issued this advisory on May 16: http://lists.mandriva.com/security-announce/2011-05/msg00011.php Our package changelog shows a fix for CVE-2011-0723 but not the other ones in this bug. These CVEs are due to the use of an internal copy of ffmpeg. The blender package is also affected (Bug 3983).
Hi, thanks for reporting this bug. As there is no maintainer for this package I added the committers in CC. (Please set the status to 'assigned' if you are working on it)
CC: (none) => cjw, fundawang, mageia
CC: (none) => dmorganec
Whoever builds this, please delete the line that says --disable-dvbhead. That configure option no longer exists. Thanks.
CVE-2010-3429 is already fixed in the version we have.
Created attachment 1350 [details] re-diffed patch for CVE-2009-4636
CVE-2010-4704 is already fixed in the version we have.
Created attachment 1351 [details] re-diffed patch for CVE-2011-0722
Created attachment 1352 [details] re-diffed patch for CVE-2011-0723
Created attachment 1353 [details] re-diffed patch for ffmpeg-mov_bad_timings (google)
ffmpeg-mov_dref_looping (google) is already fixed in the version we have.
Created attachment 1354 [details] re-diffed patch for ffmpeg-mp3_outlen (google)
Created attachment 1355 [details] re-diffed patch for ffmpeg-vorbis_zero_samplerate (google)
Created attachment 1356 [details] diff for the SPEC file
All of these patches (as well as the ones from the previous Mageia 1 update, patches 36-42) should also be added to the Cauldron mplayer package.
Advisory: ======================== Updated mplayer packages fix security vulnerabilities: FFmpeg 0.5 allows remote attackers to cause a denial of service (hang) via a crafted file that triggers an infinite loop. (CVE-2009-4636) Fix heap corruption crashes (CVE-2011-0722) And several additional vulnerabilites originally discovered by Google Chrome developers were also fixed with this advisory. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0722 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4636 http://www.mandriva.com/en/support/security/advisories/?dis=2010.1&name=MDVSA-2011:089 ======================== Updated packages in core/updates_testing: ======================== mplayer-1.0-1.rc4.0.r32713.5.2.mga1 mplayer-doc-1.0-1.rc4.0.r32713.5.2.mga1 mplayer-gui-1.0-1.rc4.0.r32713.5.2.mga1 mencoder-1.0-1.rc4.0.r32713.5.2.mga1 from mplayer-1.0-1.rc4.0.r32713.5.2.mga1.src.rpm
This is available for testing!
Assignee: bugsquad => qa-bugs
Summary: mplayer missing security update for CVE-2009-4636, CVE-2010-3429, CVE-2010-4704, CVE-2011-0722 => mplayer missing security update for CVE-2009-4636 and CVE-2011-0722
I thought the tainted versions would be automatically built at the same time, but they are not showing up in the i586 Tainted Updates Testing repositories.
CC: (none) => davidwhodgins
(In reply to comment #16) > I thought the tainted versions would be automatically built at the same time, > but they are not showing up in the i586 Tainted Updates Testing repositories. I just checked the i586 tainted/updates_testing and it is there.
Sorry, my mistake. I'd disabled Tainted Updates Testing for a prior test, and forget to re-enable it. I'll try to remember to check the actual repository in future. Testing complete on i586 for the srpms mplayer-1.0-1.rc4.0.r32713.5.2.mga1.src.rpm mplayer-1.0-1.rc4.0.r32713.5.2.mga1.tainted.src.rpm Played a variety of video and audio files, and used mencoder to create a video from jpg images, then installed the tainted version and played a .m4a file.
Testing complete on Mageia release 1 (Official) for x86_64 for the srpms : -mplayer-1.0-1.rc4.0.r32713.5.2.mga1.src.rpm -mplayer-1.0-1.rc4.0.r32713.5.2.mga1.tainted.src.rpm Works good for me too. (In reply to comment #18) >Played a variety of video and audio files, and used mencoder to >create a video from jpg images, then installed the tainted version >and played a .m4a file.
CC: (none) => geiger.david68210
Validating. Advisory in Comment 14. Could sysadmin please push from core/updates_testing to core/updates Thank you!
Keywords: (none) => validated_updateCC: (none) => sysadmin-bugsHardware: i586 => All
update pushed for core and tainted
Status: NEW => RESOLVEDCC: (none) => tmbResolution: (none) => FIXED