Branches for Intrepid

Name Status Last Modified Last Commit
lp:ubuntu/intrepid/vlc 2 Mature 2010-01-08 15:32:02 UTC
48. * link vlc to unicode enabled curses ...

Author: Reinhard Tartler
Revision Date: 2008-10-13 21:47:13 UTC

* link vlc to unicode enabled curses library. Thanks to Rafaël Carré for
  reporting.(LP: #282644)
* enable emedded video (LP: #282582)
* Autodetect screen while using Xinerama to toggle fullscreen (LP: #115419)

lp:ubuntu/intrepid-security/vlc bug 2 Mature 2009-07-14 12:20:28 UTC
50. * SECURITY UPDATE: Arbitrary code exe...

Author: Marc Deslauriers
Revision Date: 2009-06-28 12:13:15 UTC

* SECURITY UPDATE: Arbitrary code execution via stack-based overflow in
  the Ty demux plugin (LP: #285922)
  - debian/patches/901_CVE-2008-4654.patch: don't overflow mst_buf in
    modules/demux/ty.c
  - CVE-2008-4654
* SECURITY UPDATE: Arbitrary code execution via integer overflows in
  the Ty demux plugin (LP: #285922)
  - debian/patches/902_CVE-2008-4686.patch: make some variables unsigned
    in modules/demux/ty.c so they don't overflow.
  - CVE-2008-4686
* SECURITY UPDATE: Arbitrary code execution via stack-based buffer
  overflow via invalid RealText subtitle file.
  - debian/patches/903_CVE-2008-5036.patch: limit sscanf sizes in
    modules/demux/subtitle.c
  - CVE-2008-5036
* SECURITY UPDATE: Arbitrary code execution via heap-based buffer
  overflow via malformed RealMedia file.
  - debian/patches/904_CVE-2008-5276.patch: replace malloc with calloc in
    modules/demux/real.c
  - CVE-2008-5276
* SECURITY UPDATE: Denial of service via long input argument.
  - debian/patches/905_CVE-2009-1045.patch: make sure we can't overflow
    psz_dup in src/input/input.c
  - CVE-2009-1045

lp:ubuntu/intrepid-updates/vlc 2 Mature 2009-07-14 12:19:15 UTC
50. * SECURITY UPDATE: Arbitrary code exe...

Author: Marc Deslauriers
Revision Date: 2009-06-28 12:13:15 UTC

* SECURITY UPDATE: Arbitrary code execution via stack-based overflow in
  the Ty demux plugin (LP: #285922)
  - debian/patches/901_CVE-2008-4654.patch: don't overflow mst_buf in
    modules/demux/ty.c
  - CVE-2008-4654
* SECURITY UPDATE: Arbitrary code execution via integer overflows in
  the Ty demux plugin (LP: #285922)
  - debian/patches/902_CVE-2008-4686.patch: make some variables unsigned
    in modules/demux/ty.c so they don't overflow.
  - CVE-2008-4686
* SECURITY UPDATE: Arbitrary code execution via stack-based buffer
  overflow via invalid RealText subtitle file.
  - debian/patches/903_CVE-2008-5036.patch: limit sscanf sizes in
    modules/demux/subtitle.c
  - CVE-2008-5036
* SECURITY UPDATE: Arbitrary code execution via heap-based buffer
  overflow via malformed RealMedia file.
  - debian/patches/904_CVE-2008-5276.patch: replace malloc with calloc in
    modules/demux/real.c
  - CVE-2008-5276
* SECURITY UPDATE: Denial of service via long input argument.
  - debian/patches/905_CVE-2009-1045.patch: make sure we can't overflow
    psz_dup in src/input/input.c
  - CVE-2009-1045

13 of 3 results