After being in contact with upstream, I received a non-public exploit. This exploit was run against Intrepid, Hardy, Gutsy, Feisty and Dapper and caused the application to segfault.
[12013.368559] faad[9750]: segfault at 9758000 ip 0804bed3 sp bfba6d50 error 4 in faad[8048000+6000] After applying the fix, the same exploit was run and the application exited successfully without segfaulting. This is a minor patch, created by upstream, and no regressions or functionality problems were detected. -- [CVE-2008-4201] faad2 2.6.1 - Heap-based buffer overflow in the decodeMP4file function and possibly execute arbitrary code via a crafted MPEG-4 (MP4) file https://bugs.launchpad.net/bugs/277110 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs