Package: opus Severity: serious Version: 0.9.14+20120615-1 Tags: security Hi, the following vulnerability was published for opus.
CVE-2013-0899[0]: | Integer overflow in the padding implementation in the | opus_packet_parse_impl function in src/opus_decoder.c in Opus before | 1.0.2, as used in Google Chrome before 25.0.1364.97 on Windows and | Linux and before 25.0.1364.99 on Mac OS X and other products, allows | remote attackers to cause a denial of service (out-of-bounds read) via | a long packet. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0899 http://security-tracker.debian.org/tracker/CVE-2013-0899 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org