-
libxv (2:1.0.7-1ubuntu0.12.10.1) quantal-security; urgency=low
* SECURITY UPDATE: denial of service and possible code execution via
incorrect memory size calculations
- 79362c764a6df7e7fbe5247756bdbf60f3a58baf
- 6e1b743a276651195be3cd68dff41e38426bf3ab
- 59301c1b5095f7dc6359d5b396dbbcdee7038270
- 50fc4cb18069cb9450a02c13f80223ef23511409
- CVE-2013-1989
* SECURITY UPDATE: denial of service and possible code execution via
incorrect length and bounds checking
- 15ab7dec17d686c38f2c82ac23a17cac5622322a
- CVE-2013-2066
-- Marc Deslauriers <email address hidden> Wed, 29 May 2013 08:55:06 -0400
-
libxv (2:1.0.7-1) unstable; urgency=low
[ Robert Hooker ]
* New upstream release.
[ Julien Cristau ]
* Drop dh_testroot from debian/rules clean.
* Remove David and Andres from Uploaders.
-- Julien Cristau <email address hidden> Tue, 24 Apr 2012 21:19:01 +0200
-
libxv (2:1.0.6-2build1) precise; urgency=low
* No-change rebuild since current package was built with a version of
gzip that had memory initialization bug 871083.
-- Bryce Harrington <email address hidden> Tue, 28 Feb 2012 12:00:42 -0800