Go to file
Stephan Kulow c6d6713ad6 Accepting request 148342 from multimedia:libs
Fix a minor security issue. This fix is in version 1.0.2, however since we are in freeze, I cherrypicked this fix from upstream git.

From commit https://git.xiph.org/?p=opus.git;a=commit;h=9345aaa5ca1c2fb7d62981b2a538e0ce20612c38

Fixes an out-of-bounds read issue with the padding handling code

This was reported by Juri Aedla and is limited to reading memory up
to about 60 kB beyond the compressed buffer. This can only be triggered
by a compressed packet more than about 16 MB long, so it's not a problem
for RTP. In theory, it *could* crash an Ogg decoder if the memory just after
the incoming packet is out-of-range.
 (forwarded request 148337 from Zaitor)

OBS-URL: https://build.opensuse.org/request/show/148342
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/opus?expand=0&rev=3
2013-01-14 08:44:10 +00:00
.gitattributes 0.9.14 2012-05-31 14:34:09 +00:00
.gitignore 0.9.14 2012-05-31 14:34:09 +00:00
baselibs.conf 0.9.14 2012-05-31 14:34:09 +00:00
opus-1.0.1.tar.gz Accepting request 135513 from home:Zaitor:branches:multimedia:libs 2012-09-23 21:05:15 +00:00
opus-fix-out-of-bounds-read-issue-with-the-padding-handling.patch Accepting request 148337 from home:Zaitor:branches:multimedia:libs:opus 2013-01-13 20:43:28 +00:00
opus.changes Accepting request 148337 from home:Zaitor:branches:multimedia:libs:opus 2013-01-13 20:43:28 +00:00
opus.spec Accepting request 148337 from home:Zaitor:branches:multimedia:libs:opus 2013-01-13 20:43:28 +00:00