# HG changeset patch
# User Darren Salt <[EMAIL PROTECTED]>
# Date 1172442582 0
# Node ID 671d134b2b1f5795f1e715e0db75638f5bb69175
# Parent  670c371b657713b9b59186844277f8268c698330
# Parent  3e5cb046702753584565972c825181072b5420cf
Merge what was to be 0.5.8-2 (before the security issue came up) for 0.5.8-3.

diff -r 671d134b2b1f5795f1e715e0db75638f5bb69175 -r 
670c371b657713b9b59186844277f8268c698330 debian/changelog
--- a/debian/changelog  Sun Feb 25 22:29:42 2007 +0000
+++ b/debian/changelog  Sun Feb 25 21:34:45 2007 +0000
@@ -1,30 +1,49 @@ gxine (0.5.8-2) unstable; urgency=medium
-gxine (0.5.8-2) unstable; urgency=medium
-
-  * Various fixes, targetted for inclusion in etch, hence the urgency.
-    None are actually RC.
+gxine (0.5.8-3) unstable; urgency=medium
+
+  * Various fixes, targetted for inclusion in etch.
 
   * Patches backported from hg head:
     + Important:
       - Say something useful if the stream couldn't be opened or demux failed.
-      - Fix a hang should gxine try to report an error.
+       Without this, you'll see "Unknown error" for demux failures and missing
+       or inaccessible files.
+      - Fix a hang should gxine try to report an error while starting up.
       - gdk_threads_leave() was called once too many if xine_open() failed.
       - Reinstate the GDK thread locking around the error display code (due to
         the error hang fix causing a different error hang).
+      - Fix a bug in the HTTP handler (sscanf discarded string).
+       Without this, gcc reports the following:
+         http.c: In function ‘http_open’: 
+         http.c:502: warning: too many arguments for format
+       and the string won't be written to the buffer.
     + Normal:
-      - Fixes for when closing the "about" dbox.
+      - Fixes for when closing the "about" box. (SF bug 1576681)
+       Needed to cope well with changes in GtkAboutDialog (GNOME bug 333360).
       - Stop repeated errors in case of failure to open the logo image.
-      - Fix a bug in the HTTP handler (sscanf discarded string).
+       This is not expected to be triggered with etch's libxine1.
     + Minor:
       - Delay signal attachment to avoid possible GTK warnings during startup.
-      - German translation updates, related to other changes in this patch set.
       - Stop xscreensaver from blanking the screen while running in
-        full-screen mode. (Ubuntu 64135)
-
-  * Define XSSCMD (xscreensaver-command) at build time, else build will fail.
-  * Enabled the watchdog code: kills gxine if it gets stuck for 30 seconds.
-    Due to some of the above patches, I don't expect this code to be invoked.
-
- -- Darren Salt <[EMAIL PROTECTED]>  Sat, 25 Nov 2006 14:51:54 +0000
+        full-screen mode. (Ubuntu bug 64135)
+      - Translation fixups for the xscreensaver patch.
+
+  * Define XSSCMD (xscreensaver-command) at build time, else build will fail
+    due to the xscreensaver patch and the lack of a build-dep on xscreensaver.
+
+ -- Darren Salt <[EMAIL PROTECTED]>  Sun, 25 Feb 2007 22:21:59 +0000
+
+gxine (0.5.8-2) unstable; urgency=high
+
+  * SECURITY FIX (local exploit)                       (closes: #405876)
+    This version fixes a potential buffer overflow in gxine's server
+    component and in gxine_client. This overflow would occur were $HOME
+    sufficiently long - 94 bytes or more would cause socket creation or
+    connection failure, and 242 bytes or more would cause a segfault or
+    possible arbitrary code execution.
+  * Enabled the watchdog code (which will kill gxine if it gets stuck for
+    30 seconds).
+
+ -- Darren Salt <[EMAIL PROTECTED]>  Sun, 07 Jan 2007 19:32:05 +0000
 
 gxine (0.5.8-1) unstable; urgency=low
 
diff -r 671d134b2b1f5795f1e715e0db75638f5bb69175 -r 
670c371b657713b9b59186844277f8268c698330 debian/control
--- a/debian/control    Sun Feb 25 22:29:42 2007 +0000
+++ b/debian/control    Sun Feb 25 21:34:45 2007 +0000
@@ -3,7 +3,7 @@ Priority: optional
 Priority: optional
 Maintainer: Siggi Langauf <[EMAIL PROTECTED]>
 Uploaders: Darren Salt <[EMAIL PROTECTED]>
-Build-Depends: debhelper (>> 4.0.0), libxine-dev (>= 1.0), libgtk2.0-dev, 
libxaw7-dev, libxtst-dev, libmozjs-dev | libsmjs-dev, liblircclient-dev, 
libdbus-glib-1-dev | dbus-glib-1-dev, dpatch
+Build-Depends: debhelper (>> 4.0.0), dpatch, libxine-dev (>= 1.0), 
libgtk2.0-dev, libxaw7-dev, libxtst-dev, libmozjs-dev | libsmjs-dev, 
liblircclient-dev, libdbus-glib-1-dev | dbus-glib-1-dev
 Standards-Version: 3.7.2
 
 Package: gxine
diff -r 671d134b2b1f5795f1e715e0db75638f5bb69175 -r 
670c371b657713b9b59186844277f8268c698330 debian/patches/00list
--- a/debian/patches/00list     Sun Feb 25 22:29:42 2007 +0000
+++ b/debian/patches/00list     Sun Feb 25 21:34:45 2007 +0000
@@ -1,3 +1,4 @@ 01-poke-xscreensaver
+01_prevent_local_exploit
 01-poke-xscreensaver
 02-close-about-dbox
 03-improve-error-reporting
diff -r 671d134b2b1f5795f1e715e0db75638f5bb69175 -r 
670c371b657713b9b59186844277f8268c698330 
debian/patches/01_prevent_local_exploit.dpatch
--- a/debian/patches/01_prevent_local_exploit.dpatch    Sun Feb 25 22:29:42 
2007 +0000
+++ /dev/null   Thu Jan 01 00:00:00 1970 +0000
@@ -1,55 +0,0 @@
-#! /bin/sh /usr/share/dpatch/dpatch-run
-## 01_prevent_local_exploit.dpatch by  <[EMAIL PROTECTED]>
-##
-## All lines beginning with `## DP:' are a description of the patch.
-## DP: SECURITY FIX (local exploit) 
-## DP: This version fixes a potential buffer overflow in gxine's server
-## DP: component and in gxine_client. This overflow would occur were $HOME
-## DP: sufficiently long - 94 bytes or more would cause socket creation or
-## DP: connection failure, and 242 bytes or more would cause a segfault or
-## DP: possible arbitrary code execution.
-
[EMAIL PROTECTED]@
-diff -urNad gxine-0.5.8-deb~/src/client.c gxine-0.5.8-deb/src/client.c
---- gxine-0.5.8-deb~/src/client.c      2007-01-07 03:08:48.000000000 +0000
-+++ gxine-0.5.8-deb/src/client.c       2007-01-07 19:28:15.984461996 +0000
-@@ -70,6 +70,11 @@
- 
-   /* server filename */
-   snprintf (filename, sizeof (filename), SOCKET_FILENAME, getenv ("HOME"));
-+  if (strlen (filename) >= sizeof (cli_adr.u.sun_path))
-+  {
-+    fputs (_("socket: name too long - cannot connect\n"), stderr);
-+    exit (EXIT_FAILURE);
-+  }
- 
-   g_print (_("Connecting to %s...\n"), filename);
- 
-diff -urNad gxine-0.5.8-deb~/src/server.c gxine-0.5.8-deb/src/server.c
---- gxine-0.5.8-deb~/src/server.c      2007-01-07 03:08:48.000000000 +0000
-+++ gxine-0.5.8-deb/src/server.c       2007-01-07 19:28:43.748688602 +0000
-@@ -187,7 +187,14 @@
- {
-   char filename[FILENAME_MAX];
-   snprintf (filename, sizeof (filename), SOCKET_FILENAME, getenv ("HOME"));
--  gxsocket = make_socket (filename);
-+  if (strlen (filename) >= sizeof (((struct sockaddr_un *)0)->sun_path))
-+  {
-+    fputs (_("server: name too long - gxine_client will not be able to 
connect\n"),
-+         stderr);
-+    gxsocket = -1;
-+  }
-+  else
-+    gxsocket = make_socket (filename);
- }
- 
- void server_start (void)
-@@ -244,6 +251,8 @@
- 
-   /* server filename */
-   snprintf (filename, PATH_MAX, SOCKET_FILENAME, getenv ("HOME"));
-+  if (strlen (filename) >= sizeof (cli_adr.u.sun_path))
-+    return 0; /* no point in printing anything... */
- 
-   logprintf ("server: trying to connect to already running instance of gxine 
(%s)...\n",
-           filename);

-------------------------------------------------------------------------
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT & business topics through brief surveys-and earn cash
http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV
_______________________________________________
Xine-cvslog mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/xine-cvslog

Reply via email to