Change log for libmad package in Debian
1 → 13 of 13 results | First • Previous • Next • Last |
Published in sid-release |
libmad (0.15.1b-10.2) unstable; urgency=medium * Non-maintainer upload. * Convert to source format 3.0. (Closes: #1007045) -- Bastian Germann <email address hidden> Sat, 23 Mar 2024 20:30:30 +0000
libmad (0.15.1b-10.1) unstable; urgency=medium * Non-maintainer upload. * Bump debhelper to 7. (Closes: #965663) * Update package version in pkg-config file. (Closes: #990838) -- Håvard F. Aasen <email address hidden> Wed, 27 Jul 2022 21:50:28 +0200
libmad (0.15.1b-10) unstable; urgency=medium * Remove old alioth list as maintainer (Closes: #899582) * Remove Sam Clegg from uploaders * Add upstream signing key * Update watch file to find the signature file -- Kurt Roeckx <email address hidden> Sun, 10 Mar 2019 16:42:14 +0100
Published in stretch-release |
libmad (0.15.1b-8+deb9u1) stretch-security; urgency=high * Properly check the size of the main data. The previous patch only checked that it could fit in the buffer, but didn't ensure there was actually enough room free in the buffer. This was assigned both CVE-2017-8372 and CVE-2017-8373, but they are really the same, just a different way to detect it. (Closes: #287519) * Rewrite patch to check the size of buffer. It now checks it before reading it instead of afterwards checking that we did read too much. This now also covers parsing the frame and layer3, not just layer 1 and 2. This was original reported in #508133. CVE-2017-8374 mentions a case in layer 3. -- Kurt Roeckx <email address hidden> Tue, 01 May 2018 13:20:28 +0200
Published in jessie-release |
libmad (0.15.1b-8+deb8u1) jessie-security; urgency=high * Properly check the size of the main data. The previous patch only checked that it could fit in the buffer, but didn't ensure there was actually enough room free in the buffer. This was assigned both CVE-2017-8372 and CVE-2017-8373, but they are really the same, just a different way to detect it. (Closes: #287519) * Rewrite patch to check the size of buffer. It now checks it before reading it instead of afterwards checking that we did read too much. This now also covers parsing the frame and layer3, not just layer 1 and 2. This was original reported in #508133. CVE-2017-8374 mentions a case in layer 3. -- Kurt Roeckx <email address hidden> Tue, 01 May 2018 13:20:28 +0200
libmad (0.15.1b-9) unstable; urgency=high * Properly check the size of the main data. The previous patch only checked that it could fit in the buffer, but didn't ensure there was actually enough room free in the buffer. This was assigned both CVE-2017-8372 and CVE-2017-8373, but they are really the same, just a different way to detect it. (Closes: #287519) * Rewrite patch to check the size of buffer. It now checks it before reading it instead of afterwards checking that we did read too much. This now also covers parsing the frame and layer3, not just layer 1 and 2. This was original reported in #508133. CVE-2017-8374 mentions a case in layer 3. -- Kurt Roeckx <email address hidden> Sun, 28 Jan 2018 16:28:46 +0100
libmad (0.15.1b-8.1) unstable; urgency=medium * Non-maintainer upload. * Remove Clément Stenac from Uploaders (Closes: #868708) [ Helmut Grohne ] * Move mad.pc to a multiarch location. (Closes: #850461) -- Manuel A. Fernandez Montecelo <email address hidden> Tue, 31 Oct 2017 22:16:36 +0100
Superseded in buster-release |
Superseded in stretch-release |
Superseded in jessie-release |
Superseded in sid-release |
libmad (0.15.1b-8) unstable; urgency=low * Add multiarch support. (Closes: #653676) Patch by Steve Langasek <email address hidden> * Use dh-autoreconf to update libtool so that it works on x32 (Closes: #700437) -- Kurt Roeckx <email address hidden> Mon, 20 May 2013 18:02:18 +0200
libmad (0.15.1b-7) unstable; urgency=low * Fix arm's MAD_F_MLN thumb case causing problems on arhmf. Patch by Dave Martin (Closes: #656814) * Add ${misc:Depends} to the Depends. -- Kurt Roeckx <email address hidden> Sun, 22 Jan 2012 23:02:29 +0100
libmad (0.15.1b-6) unstable; urgency=low [ Konstantinos Margaritis ] * Add support for armhf (Closes: #596936) - libmad.thumb.diff: use "adr" instead of "add" to make code ready for thumb2 - Provide-Thumb-2-alternative-code-for-MAD_F_MLN.diff: fix another ftbfs with thumb2 as "rsc" doesnt exist anymore - thanks to Dave Martin for this patch -- Kurt Roeckx <email address hidden> Tue, 29 Mar 2011 22:26:22 +0200
Available diffs
libmad (0.15.1b-5) unstable; urgency=low * gcc-4.4 removed an assembler constraint on mips/mipsel. Use the new way of doing it. (Closes: #568418) -- Kurt Roeckx <email address hidden> Fri, 19 Feb 2010 20:51:00 +0100
libmad (0.15.1b-4) unstable; urgency=low * On an invalid mpeg file we can go past the end of the buffer. (Closes: #508133) -- Kurt Roeckx <email address hidden> Tue, 23 Dec 2008 21:38:34 +0100
libmad (0.15.1b-3) unstable; urgency=low * Acknowledge NMU * Use DEB_DH_MAKESHLIBS_ARGS_libmad0 instead to set shlibs. * Update Clément Stenac's email address to use <email address hidden> * Add build dependency on autotools-dev, quilt * Don't use -O plus some other -f options, just use -O2. (Closes: #415279) * Use the 64bit fixed point math on amd64 to have a higher quality output than the default. (Closes: #465438) * Bump shlibs since it changes the size of mad_build on amd64. * Add compat file, level 5. Change build dependency of debhelper to 5. * Don't set -lm in the mad.pc file. libmad doesn't use any math function. * Remove libmad0 Depends on pkg-config. * Change to Standards-Version 3.7.3: - Change ${Source-Version} into ${binary:Version} -- Kurt Roeckx <email address hidden> Sat, 15 Mar 2008 13:51:31 +0000
1 → 13 of 13 results | First • Previous • Next • Last |