Pufferüberläufe in xine-lib
ID: | SSA:2006-357-05 |
Distribution: | Slackware |
Plattformen: | Slackware 9.1, Slackware 10.0, Slackware 10.1, Slackware 10.2, Slackware 11.0 |
Datum: | So, 24. Dezember 2006, 03:43 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2200 |
Applikationen: | Xine |
Originalnachricht |
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] xine-lib (SSA:2006-357-05) New xine-lib packages are available for Slackware 9.1, 10.0, 10.1, 10.2, and 11.0 to fix security issues. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2200 Here are the details from the Slackware 11.0 ChangeLog: +--------------------------+ patches/packages/xine-lib-1.1.3-i686-1_slack11.0.tgz: Upgraded to xine-lib-1.1.3 which fixes possible security problems such as a heap overflow in libmms and a buffer overflow in the Real Media input plugin. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2200 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ HINT: Getting slow download speeds from ftp.slackware.com? Give slackware.osuosl.org a try. This is another primary FTP site for Slackware that can be considerably faster than downloading from ftp.slackware.com. Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating additional FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 9.1: ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/xine-lib-1.1.3-i686-1_slack9.1.tgz Updated package for Slackware 10.0: ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/xine-lib-1.1.3-i686-1_slack10.0.tgz Updated package for Slackware 10.1: ftp://ftp.slackware.com/pub/slackware/slackware-10.1/patches/packages/xine-lib-1.1.3-i686-1_slack10.1.tgz Updated package for Slackware 10.2: ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/xine-lib-1.1.3-i686-1_slack10.2.tgz Updated package for Slackware 11.0: ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/xine-lib-1.1.3-i686-1_slack11.0.tgz MD5 signatures: +-------------+ Slackware 9.1 package: fa1687a00ff18aada399ec50da8c9dd6 xine-lib-1.1.3-i686-1_slack9.1.tgz Slackware 10.0 package: 6ac0c62b486fdd7f306e2f11ae559d4b xine-lib-1.1.3-i686-1_slack10.0.tgz Slackware 10.1 package: 36ded1ce6911ce49b37b3fb7c579eace xine-lib-1.1.3-i686-1_slack10.1.tgz Slackware 10.2 package: be29817649ddb9bf902b09824d1ad6ed xine-lib-1.1.3-i686-1_slack10.2.tgz Slackware 11.0 package: 8276d06c6df229c6b8627ec571f15a37 xine-lib-1.1.3-i686-1_slack11.0.tgz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg xine-lib-1.1.3-i686-1_slack11.0.tgz +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFFjdidakRjwEAQIjMRApbrAJ0RZGLzRf/wqao8cErS8KAt9RTTnACgiMTo n0bfG3egCDy6hFaX3qdi3so= =cA4B -----END PGP SIGNATURE----- |