-
xine-lib (1.1.1+ubuntu2-7.12) dapper-security; urgency=low
* SECURITY UPDATE: Integer overflow in the 4xm demuxer
- src/demuxers/demux_4xm.c: Fix additional integer overflow, as
previous fix was incomplete.
- http://hg.debian.org/hg/xine-lib/xine-lib/rev/7799748cc0f2
- CVE-2009-0698
* SECURITY UPDATE: Integer overflow in the QT demuxer via large count
value in an STTS atom
- src/demuxers/demux_qt.c: validate atom size
- http://hg.debian.org/hg/xine-lib/xine-lib/rev/d21a4564db03
- CVE-2009-1274
-- Marc Deslauriers <email address hidden> Fri, 17 Apr 2009 13:23:54 -0400
-
xine-lib (1.1.1+ubuntu2-7.11) dapper-security; urgency=low
* REGRESSION: Broken size checks in CVE-2008-5239 input plugins patch
(LP: #322834)
- src/input/input_*.c: fix the size checks broken by the previous
security update.
- http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=b11cc37934629a2965859163db6095fbbe2b44be;style=gitweb
- CVE-2008-5239
* SECURITY UPDATE: Integer overflow in the 4xm demuxer
- src/demuxers/demux_4xm.c: Make sure we don't overflow
fourxm->track_count.
- http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=ba872682eba8a10217c48b7fe21f0fa763ef4af3;style=gitweb
- CVE-2009-0698
-- Marc Deslauriers <email address hidden> Tue, 24 Mar 2009 10:34:15 -0400
-
xine-lib (1.1.1+ubuntu2-7.10) dapper-security; urgency=low
* SECURITY UPDATE: backported security fixes from upstream xine-lib hg repo:
- src/demuxers/demux_matroska.c: avoid segfault on invalid track type in
Matroska files.
* http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=7b472fa486db;style=gitweb
- misc/cdda_server.c: fix integer overflow in the the CDDA server.
* http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=30eb014e9b320035de309ee442ebbff6d405987b;style=gitweb
- src/demuxers/demux_{ogg,avi}.c: fix crashes with fuzzed media files.
(CVE-2008-3231)
* http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=967a8e515380c0c9b9858125a054082145002d00;style=gitweb
* http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=67bfec7af3472674ba7396bd468b7607339fe102;style=gitweb
- src/demuxers/demux_{mng,mod}.c: add some checks for memory allocation
failures. (CVE-2008-5233)
* http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=35f09930323e46c92e521846b9ccdfd5e277ad16;style=gitweb
- src/demuxers/demux_qt.c: fix heap overflow in Quicktime atom parsing.
(CVE-2008-5234, CVE-2008-5242)
* http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=6e81eec36701;style=gitweb
- src/demuxers/demux_matroska.c: fix buffer overflows in Matroska demuxer.
(CVE-2008-5236)
* http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=e38bb4b22431123997a16a186fe8beb4edcfef87;style=gitweb
* http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=8e125da9ecbe;style=gitweb
* http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=b01a02595343;style=gitweb
- src/demuxers/demux_{mng,qt}.c: fix integer overflows in MNG and QT
demuxers. (CVE-2008-5237)
* http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=9c97a9a9ba17a487116a198d80a74ec7879aa801;style=gitweb
* http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=65f524e14623;style=gitweb
- src/demuxers/{demux_matroska.c,demux_mod.c,id3.h}: use size_t for data
length variables where there may be int overflows. (CVE-2008-5238)
* http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=a0830dddbd35625069506a9c49321317cbab8a2d;style=gitweb
- src/{input,demuxers}/*.c: fix out-of-bounds reads and heap-based buffer
overflows from unchecked or incompletely-checked read function results.
(CVE-2008-5239)
* http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=7fb21abb15e5a7311a2c157721ddfab0a47090ab;style=gitweb
* http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=5df277a7eec3;style=gitweb
* http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=f775929597b1c10142e51674ee02e041b1b87df4;style=gitweb
* http://hg.debian.org/hg/xine-lib/xine-lib/?cmd=changeset;node=e6efc6d566961ab231686c1ee18044f2d45a2b4a;style=gitweb
- src/demuxers/demux_real.c: fix unchecked malloc using untrusted values.
(CVE-2008-5240)
* http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=01753933e6647ed29226f18e4489ce034b569d65;style=gitweb
* http://hg.debian.org/hg/xine-lib/xine-lib/?cmd=changeset;node=071dc93156e6940a7f1b8bb38762d521dd5731e8;style=gitweb
- src/demuxers/demux_qt.c: fix integer underflow in qt compressed atom
handling. (CVE-2008-5241)
* http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=a57d5ef86b65bcc195a5358125fdb34e10a37bb4;style=gitweb
- src/demuxers/demux_real.c: fix buffer indexing using untrusted or
unchecked values. (CVE-2008-5243)
* http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=4982c9920f42657d0797145bf197127f18d8972c;style=gitweb
- src/demuxers/id3.c: fix an exploitable ID3 heap buffer overflow.
(CVE-2008-5246)
* http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=268c1c1639d766d92b7e7bb11de7b38482ebe8e9;style=gitweb
- src/xine-engine/info_helper.c: fix crashes with MP3 files with metadata
consisting only of separators. (CVE-2008-5248)
* http://hg.debian.org/hg/xine-lib/xine-lib/?cmd=changeset;node=60ab5d2bdd82f00b10205f816a545337c9363134;style=gitweb
-- Marc Deslauriers <email address hidden> Wed, 21 Jan 2009 09:56:16 -0500
-
xine-lib (1.1.1+ubuntu2-7.9) dapper-security; urgency=low
* SECURITY UPDATE: array index vulnerability
* fix for src/libspeex/xine_decoder.c to properly validate its input
* SECURITY UPDATE: buffer overflow in the NSF demuxer
* fix for src/demuxers/demux_nsf.c to use strndup() instead of strdup()
* SECURITY UPDATE: integer overflows in Qt, Real, WC3Movie, Matroska and
FILM demuxers
* fix demux_film.c, demux_qt.c, demux_real.c, demux_wc3movie.c and ebml.c to
check for failure of various memory allocations
* SECURITY UPDATE: array index vulnerability
* fix src/input/libreal/sdpplin.c and src/input/libreal/sdpplin.h to verify
size of stream_id and stream_count
* SECURITY UPDATE: buffer overflow in the RTSP header-handling code
* fix src/input/libreal/rmff.c and src/input/libreal/rmff.h to check buffer
sizes in rmff_dump_*() functions (CVE-2008-0225 and CVE-2008-0238)
* SECURITY UPDATE: buffer over in Matroska demuxer
* fix src/demuxers/demux_matroska.c to use unsigned ints and check size of
first_frame_size and frame_size, and return value of parse_ebml_sint() and
parse_ebml_uint()
* References
CVE-2008-1686
CVE-2008-1878
CVE-2008-1482
CVE-2008-0073
CVE-2008-0225
CVE-2008-0238
CVE-2008-1161
-- Jamie Strandboge <email address hidden> Wed, 30 Jul 2008 16:22:17 -0400
-
xine-lib (1.1.1+ubuntu2-7.7) dapper-security; urgency=low
* SECURITY UPDATE: DirectShow decoder heap overflow.
* src/libw32dll/DirectShow/DS_VideoDecoder.c: ported mplayer fix.
* References
http://svn.mplayerhq.hu/mplayer?view=rev&revision=22205
CVE-2007-1387
-- Kees Cook <email address hidden> Mon, 12 Mar 2007 13:44:40 -0700
-
xine-lib (1.1.1+ubuntu2-7.6) dapper-security; urgency=low
* SECURITY UPDATE: DMO decoder heap overflow.
* src/libw32dll/dmo/DMO_VideoDecoder.c: ported mplayer fix.
* References
http://svn.mplayerhq.hu/mplayer/trunk/loader/dmo/DMO_VideoDecoder.c?r1=22019&r2=22204
CVE-2007-1246
-- Kees Cook <email address hidden> Thu, 8 Mar 2007 12:29:18 -0800
-
xine-lib (1.1.1+ubuntu2-7.5) dapper-security; urgency=low
* SECURITY UPDATE: Arbitrary code execution in realmedia.
* src/realmedia/real.c: Fix buffer overflows, from upstream.
* References
https://sf.net/tracker/download.php?group_id=9655&atid=109655&file_id=204544&aid=1603470
CVE-2006-6172
-- Kees Cook <email address hidden> Fri, 1 Dec 2006 15:13:27 -0800
-
xine-lib (1.1.1+ubuntu2-7.3) dapper-security; urgency=low
* SECURITY UPDATE: Arbitrary code execution with crafted AVI index.
* src/demuxers/demux_avi.c: Fix buffer overflow in AVI index size.
* References
- CVE-2006-4799
- http://xine.cvs.sourceforge.net/xine/xine-lib/src/demuxers/demux_avi.c?r1=1.224&r2=1.225
-- Kees Cook <email address hidden> Fri, 29 Sep 2006 10:36:07 -0700
-
xine-lib (1.1.1+ubuntu2-7.2) dapper-security; urgency=low
* SECURITY UPDATE: Arbitrary code execution with crafted streams.
* src/input/mms[h].c: Fix multiple buffer overflows in embedded libmms,
thanks to patch from Matthias Hopf.
* src/input/input_http.c: Fixed previous security patch (s/buflen/BUFSIZE).
-- Martin Pitt <email address hidden> Tue, 11 Jul 2006 18:02:26 +0000
-
xine-lib (1.1.1+ubuntu2-7.1) dapper-security; urgency=low
* SECURITY UPDATE: Remote DoS and probably code execution.
* src/input/input_http.c:
- Fix buffer overflow in http_plugin_open().
- Patch from upstream CVS.
- CVE-2006-2802
-- Martin Pitt <email address hidden> Tue, 6 Jun 2006 15:53:56 +0200
-
xine-lib (1.1.1+ubuntu2-7) dapper; urgency=low
* Stop shipping the arts plugin as it useless according to upstream and
tends to break things. (Ubuntu: #44462)
http://bugzilla.gnome.org/show_bug.cgi?id=327928
-- Sebastian Dröge <email address hidden> Sun, 14 May 2006 17:07:26 +0200
-
xine-lib (1.1.1+ubuntu2-6) dapper; urgency=low
* Move the dependencies for the new gdk-pixbuf decoder to Recommends to make
the kubuntu guys happy again.
-- Sebastian Dröge <email address hidden> Wed, 22 Mar 2006 22:20:57 +0100
-
xine-lib (1.1.1+ubuntu2-5) dapper; urgency=low
* Added gdk-pixbuf decoder from CVS, add libgtk2.0-dev to Build-Depends.
Fixed image detection code in src/demuxers/demux_image.c (Closes: Malone
#35896)
-- Sebastian Dröge <email address hidden> Wed, 22 Mar 2006 19:47:40 +0100
-
xine-lib (1.1.1+ubuntu2-4) dapper; urgency=low
* src/post/goom/goomsl_lex.c: Fix buffer overflow in generated flex scanner;
surprisingly there is no flex source file in the package. (CVE-2006-0459)
-- Martin Pitt <email address hidden> Thu, 2 Mar 2006 14:45:02 +0100
-
xine-lib (1.1.1+ubuntu2-3) dapper; urgency=low
* Fix vis ARCH_OPT_CFLAGS. This revert the previous change in debian/rules.
Patch by David Miller.
-- Fabio M. Di Nitto <email address hidden> Tue, 31 Jan 2006 11:55:34 +0100
-
xine-lib (1.1.1+ubuntu2-2) dapper; urgency=low
* Enable workaround to build on sparc:
For some reasons gcc is generating asm code that is not v7 compatible
using registers that simply don't exist on that architecture.
Since we don't support such old doorstoppers, pass -mcpu=v9 and get over
it. Clearly this is not a clean solution but it will do for now.
-- Fabio M. Di Nitto <email address hidden> Sat, 28 Jan 2006 13:53:32 +0100
-
xine-lib (1.1.1+ubuntu2-1) dapper; urgency=low
* Remove the mad plugin
* Remove READMEs for other system
-- Sebastian Dröge <email address hidden> Fri, 20 Jan 2006 17:50:15 +0100
-
xine-lib (1.1.1-0ubuntu4) dapper; urgency=low
* SECURITY UPDATE: Fix arbitrary code execution with crafted PNG images in
embedded ffmpeg copy.
* src/libffmpeg/libavcodec/utils.c, avcodec_default_get_buffer(): Apply
upstream patch to fix buffer overflow on decoding of small PIX_FMT_PAL8
PNG files.
* References:
CVE-2005-4048
http://mplayerhq.hu/pipermail/ffmpeg-devel/2005-November/005333.html
http://www1.mplayerhq.hu/cgi-bin/cvsweb.cgi/ffmpeg/libavcodec/
utils.c.diff?r1=1.161&r2=1.162&cvsroot=FFMpeg
-- Martin Pitt <email address hidden> Thu, 15 Dec 2005 13:13:45 +0100