Debian changelog:

 xine-lib  (1.1.10-1) unstable; urgency=high

   * New upstream release (Closes: #459836)...
   * ... fixing some security bugs:
     - CVE-2008-0225: Heap-based buffer overflow in rmff_dump_cont function
       which allows remote attacker to execute arbitrary code via a crafted
       SDP Abstract attribute (Closes: #460551).
       This also acks 1.1.8-3+lenny1 (NMU by the security team).
     - Related to CVE-2006-1664: Buffer overflow which allows a remote
       attacker to execute arbitrary code or crash the client program via a
       crafted ASF header.
   * ... and fixing some other bugs, including:
     - Disappearing audio. (Closes: #461970)
 
   [ Darren Salt ]
   * Build-depend on gs-gpl | gs. Avoids FTBFS where recommended packages
     aren't automatically installed.
   * Put libxine1-doc in section libdevel.
   * Move libxine1-doc | libxine-doc to Suggests: in libxine1. (Closes: #458103)
   * Add postinst scripts to ensure that the documentation symlinks are
     properly created. (This is really dpkg bugginess.) (Closes: #458865)
   * Standards version 3.7.3; no changes needed.
 
   [ Reinhard Tartler ]
   * Actually install xineplug_decode_w32dll.so and xineplug_decode_qt.so
     on i386. debian/rules accidentally used $< where it should have been
     $^. Thanks to Gert Kulyk for reporting!                  LP: #182400
   * Fix XS-Hg-VCS headers in debian/control                  LP: #183886

 -- Darren Salt <[EMAIL PROTECTED]>  Sat, 26 Jan 2008
22:16:28 +0000

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2006-1664

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-0225

** Tags added: sync

-- 
Please sync xine-lib (main) from Debian unstable (main)
https://bugs.launchpad.net/bugs/181949
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to