The advisory for ffmpeg is reported as Bug 4147. There is also this advisory from Ubuntu which may be relevant: http://bazaar.launchpad.net/~ubuntu-branches/ubuntu/maverick/ffmpeg/maverick-security/revision/54
Blocks: (none) => 4146
Hi, thanks for reporting this bug. As there is no maintainer for this package I added the committers in CC. (Please set the status to 'assigned' if you are working on it)
CC: (none) => cjw, fundawang, mageia
I bumped the subrel in Mageia 1 SVN and added the patches from the Ubuntu advisory, and they apply and build fine. We still need patches for CVE-2011-3892, CVE-2011-3893, and CVE-2011-3895 from ffmpeg 0.6.5 to be identified and applied before this is built and pushed.
OK I rediffed the patches listed as relevant to these CVEs from here: http://git.videolan.org/?p=ffmpeg.git;a=log;h=refs/heads/release/0.6 and added them to Mageia 1 SVN.
mplayer-1.0-1.rc4.0.r32713.5.3.mga1.src.rpm is built (including mplayer, mplayer-doc, mplayer-gui, and mencoder RPMs). It is ready for testing!
Assignee: bugsquad => qa-bugs
Testing complete on i586 for the srpms mplayer-1.0-1.rc4.0.r32713.5.3.mga1.src.rpm mplayer-1.0-1.rc4.0.r32713.5.3.mga1.tainted.src.rpm Just testing that they work using gmplayer and lives, which uses mencoder to resize all of the frames in a flash video, and then save each frame as a png image.
CC: (none) => davidwhodgins
Tested OK x86_64 Used gnome-mplayer and some mencoder lines from http://networkedblogs.com/8Pgo Confirmed tainted mencoder could encode with the xvidencopts line. David, could you summarise the changes in an advisory please. This can then be validated. Thankyou.
Thanks Claire! Validating. Advisory: ======================== Updated mplayer packages fix security vulnerabilities: * CVE-2011-3504: denial of service and possible code execution via malformed Matroska file * CVE-2011-4351: denial of service and possible code execution via malformed file containing QDM2 stream * CVE-2011-4352: denial of service and possible code execution via malformed file containing VP3 stream * CVE-2011-4353: denial of service and possible code execution via malformed file containing VP5 or VP6 streams * CVE-2011-4364: denial of service and possible code execution via malformed VMD file * CVE-2011-4579: denial of service and possible code execution via malformed file containing svq1 stream * CVE-2011-3892: denial of service via malformed stream for the VP3 decoder * CVE-2011-3893, CVE-2011-3895: denial of service and possible code execution via malformed stream for the vorbis decoder and matroska demuxer References: http://bazaar.launchpad.net/~ubuntu-branches/ubuntu/maverick/ffmpeg/maverick-security/revision/54 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3892 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3893 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3895 ======================== Updated packages in core/updates_testing: ======================== mencoder-1.0-1.rc4.0.r32713.5.3.mga1 mplayer-1.0-1.rc4.0.r32713.5.3.mga1 mplayer-doc-1.0-1.rc4.0.r32713.5.3.mga1 mplayer-gui-1.0-1.rc4.0.r32713.5.3.mga1 from mplayer-1.0-1.rc4.0.r32713.5.3.mga1.src.rpm ======================== Could sysadmin please push from core/updates_testing to core/updates Thank you!
Keywords: (none) => validated_updateCC: (none) => sysadmin-bugsHardware: i586 => All
update pushed
Status: NEW => RESOLVEDCC: (none) => tmbResolution: (none) => FIXED
Gah, comment #7 missed to point out the mplayer in tainted, so it was not pushed, and we got this: https://bugs.mageia.org/show_bug.cgi?id=4284 I have now pushed the tainted update.