Package: xine-lib
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for xine-lib.

CVE-2008-5246[0]:
| Multiple heap-based buffer overflows in xine-lib before 1.1.15 allow
| remote attackers to execute arbitrary code via vectors that send ID3
| data to the (1) id3v22_interp_frame and (2) id3v24_interp_frame
| functions in src/demuxers/id3.c.  NOTE: the provenance of this
| information is unknown; the details are obtained solely from third
| party information.


Your upstream fix:
http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=268c1c1639d7;style=gitweb

Btw a rather strange way to fix an integer overflow + a 
strange comment.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5246
    http://security-tracker.debian.net/tracker/CVE-2008-5246

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpwVwtovoNYt.pgp
Description: PGP signature

Reply via email to