Slackware Security Advisories
Slackware Logo

News

Security Advisories

FAQ

Book

General Info

Get Slack

Install Help

Configuration

Packages

ChangeLogs

Propaganda

Ports

Other Sites

Support

Contact

Mailing Lists

About

 
From: Slackware Security Team <security@slackware.com>
To: slackware-security@slackware.com
Subject: [slackware-security] xine-lib (SSA:2005-283-01)
Date: Mon, 10 Oct 2005 19:20:02 -0700 (PDT)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  xine-lib (SSA:2005-283-01)

New xine-lib packages are available for Slackware 9.1, 10.0, 10.1, 10.2,
and -current to fix a security issue.  A format string bug may allow the
execution of arbitrary code as the user running a xine-lib linked
application.  The attacker must provide (by uploading or running a server)
specially crafted CDDB information and then get the user to play the
referenced audio CD.

The official Xine advisory may be found here:

  http://xinehq.de/index.php/security/XSA-2005-1


Here are the details from the Slackware 10.2 ChangeLog:
+--------------------------+
patches/packages/xine-lib-1.0.3a-i686-1.tgz:  Upgraded to xine-lib-1.0.3a.
  This fixes a format string bug where an attacker, if able to upload malicious
  information to a CDDB server and then get a local user to play a certain
  audio CD, may be able to run arbitrary code on the machine as the user
  running the xine-lib linked application.
  For more information, see:
    http://xinehq.de/index.php/security/XSA-2005-1
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/xine-lib-1rc4-i686-2.tgz

Updated package for Slackware 10.0:
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/xine-lib-1.0.3a-i686-1.tgz

Updated package for Slackware 10.1:
ftp://ftp.slackware.com/pub/slackware/slackware-10.1/patches/packages/xine-lib-1.0.3a-i686-1.tgz

Updated package for Slackware 10.2:
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/xine-lib-1.0.3a-i686-1.tgz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/xine-lib-1.0.3a-i686-1.tgz


MD5 signatures:
+-------------+

Slackware 9.1 package:
a7e30f447b04a3d3cf27c2ecec1e8a0b  xine-lib-1rc4-i686-2.tgz

Slackware 10.0 package:
09cef11a4e5f3bddcf23a86419e2ffcf  xine-lib-1.0.3a-i686-1.tgz

Slackware 10.1 package:
5032e15ac5118effdfac672afa1c086f  xine-lib-1.0.3a-i686-1.tgz

Slackware 10.2 package:
ad6ed7f47bf6e7b6f656733c0c3cfe2a  xine-lib-1.0.3a-i686-1.tgz

Slackware -current package:
ad6ed7f47bf6e7b6f656733c0c3cfe2a  xine-lib-1.0.3a-i686-1.tgz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg xine-lib-1.0.3a-i686-1.tgz


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+------------------------------------------------------------------------+
| To leave the slackware-security mailing list:                          |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message:                                                     |
|                                                                        |
|   unsubscribe slackware-security                                       |
|                                                                        |
| You will get a confirmation message back containing instructions to    |
| complete the process.  Please do not reply to this email address.      |
+------------------------------------------------------------------------+

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.7 (GNU/Linux)

iD8DBQFDSyFdakRjwEAQIjMRAtLYAJ9I/gsOy0w6gfv4mupgywyNA3OpAgCggKW2
lMUHHV9CqvJSPebFGYbdmRQ=
=gNaA
-----END PGP SIGNATURE-----

Slackware® is a registered trademark of Slackware Linux, Inc. All logos and graphics are copyrighted.