Package: xine-ui
Version: 0.99.3-1.3
Severity: grave
Tags: security patch sid etch
Several format string vulnerabilities have been discovered in xine-ui,
the user interface of the xine video player, which may cause a denial
of service.
This bug report refers to DSA 1093.
Regards,
Joey
--
All language designers are arrogant. Goes with the territory...
-- Larry Wall
Please always Cc to me when replying to me on the lists.
diff -u xine-ui-0.99.3/debian/changelog xine-ui-0.99.3/debian/changelog
--- xine-ui-0.99.3/debian/changelog
+++ xine-ui-0.99.3/debian/changelog
@@ -1,3 +1,12 @@
+xine-ui (0.99.3-1sarge1) stable-security; urgency=high
+
+ * Non-maintainer upload by the Security Team
+ * Corrected call to report() and printf() to fix format string
+ vulnerabilities [src/xitk/main.c, src/xitk/xine-toolkit/xitk.c,
+ CVE-2006-2230]
+
+ -- Martin Schulze <[EMAIL PROTECTED]> Wed, 17 May 2006 20:44:37 +0200
+
xine-ui (0.99.3-1) unstable; urgency=high
* new upstream release(s)
only in patch2:
unchanged:
--- xine-ui-0.99.3.orig/src/xitk/xine-toolkit/xitk.c
+++ xine-ui-0.99.3/src/xitk/xine-toolkit/xitk.c
@@ -1852,7 +1852,7 @@
sprintf(buffer, "%s%s", buffer, " ]-");
if(verbosity)
- printf(buffer);
+ printf("%s", buffer);
gXitk->wm_type = xitk_check_wm(display);
only in patch2:
unchanged:
--- xine-ui-0.99.3.orig/src/xitk/main.c
+++ xine-ui-0.99.3/src/xitk/main.c
@@ -453,7 +453,7 @@
int len;
char *blanks = " ";
- printf(title);
+ printf("%s", title);
sprintf(buffer, "%s", blanks);
plugin = *plugins++;
@@ -466,7 +466,7 @@
sprintf(buffer, "%s%s%s", buffer, (strlen(buffer) == strlen(blanks)) ?
"" : ", ", plugin);
}
else {
- printf(buffer);
+ printf("%s", buffer);
printf(",\n");
snprintf(buffer, sizeof(buffer), "%s%s", blanks, plugin);
}
@@ -475,7 +475,7 @@
}
if(strlen(buffer))
- printf(buffer);
+ printf("%s", buffer);
printf(".\n\n");
}
@@ -1194,7 +1194,7 @@
}
if(strlen(buffer))
- report(buffer);
+ report("%s", buffer);
}
break;