Login
Newsletter
Werbung

Sicherheit: Zahlenüberläufe in gstreamer0.10-plugins-good
Aktuelle Meldungen Distributionen
Name: Zahlenüberläufe in gstreamer0.10-plugins-good
ID: MDVSA-2009:130-1
Distribution: Mandriva
Plattformen: Mandriva 2008.0
Datum: Do, 3. Dezember 2009, 23:36
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1932
Applikationen: GStreamer

Originalnachricht

This is a multi-part message in MIME format...

------------=_1259879789-24326-1581


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2009:130-1
http://www.mandriva.com/security/
_______________________________________________________________________

Package : gstreamer0.10-plugins-good
Date : December 3, 2009
Affected: 2008.0
_______________________________________________________________________

Problem Description:

Multiple integer overflows in the (1) user_info_callback,
(2) user_endrow_callback, and (3) gst_pngdec_task functions
(ext/libpng/gstpngdec.c) in GStreamer Good Plug-ins (aka
gst-plugins-good or gstreamer-plugins-good) 0.10.15 allow remote
attackers to cause a denial of service and possibly execute arbitrary
code via a crafted PNG file, which triggers a buffer overflow
(CVE-2009-1932).

Update:

Packages for 2008.0 are being provided due to extended support for
Corporate products.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1932
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.0:
df985dc0abc217067a7d663c411b4209
2008.0/i586/gstreamer0.10-aalib-0.10.6-3.3mdv2008.0.i586.rpm
c548713a6efd8d262876bf1ed9363fe5
2008.0/i586/gstreamer0.10-caca-0.10.6-3.3mdv2008.0.i586.rpm
97b895479d7e42ff11735889bb4c16ed
2008.0/i586/gstreamer0.10-dv-0.10.6-3.3mdv2008.0.i586.rpm
a63dccd47b65fe27b8f6319662633201
2008.0/i586/gstreamer0.10-esound-0.10.6-3.3mdv2008.0.i586.rpm
0903bef11230d673d2cebe6e6900b2bb
2008.0/i586/gstreamer0.10-flac-0.10.6-3.3mdv2008.0.i586.rpm
e80a3bb6ed87aef074c9066e063b85ee
2008.0/i586/gstreamer0.10-plugins-good-0.10.6-3.3mdv2008.0.i586.rpm
e3c9a6aac6da3d7b8d9a45b0b561cd86
2008.0/i586/gstreamer0.10-raw1394-0.10.6-3.3mdv2008.0.i586.rpm
08745e3b02ba9fdd66573e9e1f6db381
2008.0/i586/gstreamer0.10-speex-0.10.6-3.3mdv2008.0.i586.rpm
2bedca9a38fd4bca8879b1c947dedffa
2008.0/i586/gstreamer0.10-wavpack-0.10.6-3.3mdv2008.0.i586.rpm
bce20d4accbb9500b91d7dfc7283802d
2008.0/SRPMS/gstreamer0.10-plugins-good-0.10.6-3.3mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
295a03de38ee7d2f94f8f7a072d4ef83
2008.0/x86_64/gstreamer0.10-aalib-0.10.6-3.3mdv2008.0.x86_64.rpm
1949357b44313e9342f9e0f064cfe921
2008.0/x86_64/gstreamer0.10-caca-0.10.6-3.3mdv2008.0.x86_64.rpm
5b1402d0fed2ab576ae4226a4aae72a4
2008.0/x86_64/gstreamer0.10-dv-0.10.6-3.3mdv2008.0.x86_64.rpm
22803eab821db27cca1c6362ae2a05d7
2008.0/x86_64/gstreamer0.10-esound-0.10.6-3.3mdv2008.0.x86_64.rpm
915d40526cdfc5bab5d54126f6a90f69
2008.0/x86_64/gstreamer0.10-flac-0.10.6-3.3mdv2008.0.x86_64.rpm
48f0e87f8105251ad7edd7553ae2060f
2008.0/x86_64/gstreamer0.10-plugins-good-0.10.6-3.3mdv2008.0.x86_64.rpm
93e82958bc9833629af16a21372b503d
2008.0/x86_64/gstreamer0.10-raw1394-0.10.6-3.3mdv2008.0.x86_64.rpm
936698fc48970cd422cd0fac330e5e99
2008.0/x86_64/gstreamer0.10-speex-0.10.6-3.3mdv2008.0.x86_64.rpm
1edc68a1a2e4248495df6435a4e38ac6
2008.0/x86_64/gstreamer0.10-wavpack-0.10.6-3.3mdv2008.0.x86_64.rpm
bce20d4accbb9500b91d7dfc7283802d
2008.0/SRPMS/gstreamer0.10-plugins-good-0.10.6-3.3mdv2008.0.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLGBF8mqjQ0CJFipgRAlvjAJ9h9KnXtEP3oqwgaUvRERM7z8xEFQCdGHms
QZ0/5EhLrjKzxAm3OVrws2A=
=OIZm
-----END PGP SIGNATURE-----


------------=_1259879789-24326-1581
Content-Type: text/plain; name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1259879789-24326-1581--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung