Bug#354436: Bug#363127: CVE-2006-1664: Malformed MPEG Stream Buffer Overflow Vulnerability

2006-06-07 Thread Reinhard Tartler
On Tue, Jun 06, 2006 at 11:04:40PM +0100, Darren Salt wrote: I demand that Reinhard Tartler may or may not have written... [snip] I prepared an upload here: http://siretart.tauware.de/upload-queue/xine-lib_1.1.1-2.dsc It needs the attached patch (committed to CVS by Matthias Hopf). I

Bug#363127: CVE-2006-1664: Malformed MPEG Stream Buffer Overflow Vulnerability

2006-06-07 Thread Darren Salt
And another patch, prompted by Martin Michlmayr's posting in debian-devel about gcc 4.1 being the default for etch. Changelog entry addition: * Kill some pointer-int casting warnings on 64-bit architectures. (All three fixes are in CVS HEAD; I've just committed two of them.) -- | Darren Salt

Bug#354436: Bug#363127: CVE-2006-1664: Malformed MPEG Stream Buffer Overflow Vulnerability

2006-06-06 Thread Darren Salt
I demand that Reinhard Tartler may or may not have written... [snip] I prepared an upload here: http://siretart.tauware.de/upload-queue/xine-lib_1.1.1-2.dsc It needs the attached patch (committed to CVS by Matthias Hopf). -- | Darren Salt| linux or ds at | nr. Ashington, |

Bug#354436: Bug#363127: CVE-2006-1664: Malformed MPEG Stream Buffer Overflow Vulnerability

2006-06-04 Thread Reinhard Tartler
On Sat, Jun 03, 2006 at 02:37:47PM +0100, Darren Salt wrote: I took your source package and gave it the version 1.1.1-2. I sucessfully built it on amd64, but got no sound at all (but might be chroot related, so I'm not sure). Bind-mounting /dev should fix that :-) (I can test on amd64

Bug#363127: CVE-2006-1664: Malformed MPEG Stream Buffer Overflow Vulnerability

2006-06-03 Thread Darren Salt
I demand that Reinhard Tartler may or may not have written... On Fri, Jun 02, 2006 at 10:10:01PM +0100, Darren Salt wrote: The .diff.gz, .dsc etc. for 1.1.1-1.2 are at URL:http://zap.tartarus.org/~ds/debian/ Btw, why aren't you in Uploaders: and prepare a new maintainer upload? Siggi -

Bug#363127: CVE-2006-1664: Malformed MPEG Stream Buffer Overflow Vulnerability

2006-06-02 Thread Reinhard Tartler
On Thu, Jun 01, 2006 at 11:17:48PM +0100, Darren Salt wrote: I'm going to prepare an NMU (sponsored by Adeodato Simó) which may or may not fix this bug (but will fix various others, particularly the build failure on sparc, which is due to a missing -I dir). It should also fix the sorry,

Bug#363127: CVE-2006-1664: Malformed MPEG Stream Buffer Overflow Vulnerability

2006-06-02 Thread Darren Salt
I demand that Reinhard Tartler may or may not have written... On Thu, Jun 01, 2006 at 11:17:48PM +0100, Darren Salt wrote: I'm going to prepare an NMU (sponsored by Adeodato Simó) which may or may not fix this bug (but will fix various others, particularly the build failure on sparc, which is

Bug#363127: CVE-2006-1664: Malformed MPEG Stream Buffer Overflow Vulnerability

2006-06-02 Thread Reinhard Tartler
On Fri, Jun 02, 2006 at 07:14:05PM +0100, Darren Salt wrote: I demand that Reinhard Tartler may or may not have written... I'm going to prepare an NMU (sponsored by Adeodato Simó) which may or may not fix this bug (but will fix various others, particularly the build failure on sparc,

Bug#363127: xine-lib patches (was: Bug#363127: CVE-2006-1664: Malformed MPEG Stream Buffer Overflow Vulnerability)

2006-06-02 Thread Darren Salt
I demand that Reinhard Tartler may or may not have written... On Fri, Jun 02, 2006 at 07:14:05PM +0100, Darren Salt wrote: [snip] On mips, the problem in the buildd log is too-early use of inline functions; you should find that my VDR-patched version is buildable there, or at least fails

Bug#363127: CVE-2006-1664: Malformed MPEG Stream Buffer Overflow Vulnerability

2006-06-02 Thread Adeodato Simó
* Reinhard Tartler [Fri, 02 Jun 2006 21:41:02 +0200]: Hey, On Fri, Jun 02, 2006 at 07:14:05PM +0100, Darren Salt wrote: I demand that Reinhard Tartler may or may not have written... How about uploading it to experimental first, and give more ppl the chance of actually testing it?

Bug#363127: CVE-2006-1664: Malformed MPEG Stream Buffer Overflow Vulnerability

2006-06-02 Thread Darren Salt
I demand that Adeodato Simó may or may not have written... * Reinhard Tartler [Fri, 02 Jun 2006 21:41:02 +0200]: On Fri, Jun 02, 2006 at 07:14:05PM +0100, Darren Salt wrote: I demand that Reinhard Tartler may or may not have written... How about uploading it to experimental first, and give

Bug#363127: CVE-2006-1664: Malformed MPEG Stream Buffer Overflow Vulnerability

2006-06-01 Thread Darren Salt
I'm going to prepare an NMU (sponsored by Adeodato Simó) which may or may not fix this bug (but will fix various others, particularly the build failure on sparc, which is due to a missing -I dir). It should also fix the sorry, unimplemented failures on some other architectures, which is due to use

Bug#363127: CVE-2006-1664: Malformed MPEG Stream Buffer Overflow Vulnerability

2006-04-26 Thread Martin Schulze
Stefan Fritsch wrote: Package: libxine1 Version: 1.1.1-1 Severity: grave Tags: security Justification: user security hole According to CVE-2006-1664, there is a buffer overflow in xine_list_delete_current in libxine 1.14 and earlier, as distributed in xine-lib 1.1.1 and earlier,

Bug#363127: CVE-2006-1664: Malformed MPEG Stream Buffer Overflow Vulnerability

2006-04-26 Thread Stefan Fritsch
No, I didn't test the exploit when I filed the bug. I can't reproduce the crash now, neither with xine nor gxine (gxine is in a separate package). The file seems to be asf, and normally the xine in debian can play (or at least demux) asf. Either Debian's xine is not vulnerable because some

Bug#363127: CVE-2006-1664: Malformed MPEG Stream Buffer Overflow Vulnerability

2006-04-17 Thread Stefan Fritsch
Package: libxine1 Version: 1.1.1-1 Severity: grave Tags: security Justification: user security hole According to CVE-2006-1664, there is a buffer overflow in xine_list_delete_current in libxine 1.14 and earlier, as distributed in xine-lib 1.1.1 and earlier, allows remote attackers to execute