Date: Fri, 13 Mar 2009 08:46:06 +0300 (MSK) From: Eygene Ryabinkin <rea-fbsd@codelabs.ru> To: FreeBSD-gnats-submit@freebsd.org Subject: ports/132593: [vuxml] [patch] multimedia/libxine: document TKADV2009-004 and other security fixes Message-ID: <20090313054606.91303DA820@void.codelabs.ru> Resent-Message-ID: <200903130550.n2D5o2OY017366@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 132593 >Category: ports >Synopsis: [vuxml] [patch] multimedia/libxine: document TKADV2009-004 and other security fixes >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Fri Mar 13 05:50:01 UTC 2009 >Closed-Date: >Last-Modified: >Originator: Eygene Ryabinkin >Release: FreeBSD 7.1-STABLE amd64 >Organization: Code Labs >Environment: System: FreeBSD 7.1-STABLE amd64 >Description: Some vulnerabilities were fixed in libxine 1.1.16.2 [1]. FreeBSD port is already at 1.1.16.2, but we should document the vulnerabilities. >How-To-Repeat: [1] http://sourceforge.net/project/shownotes.php?group_id=9655&release_id=660071 >Fix: The following VuXML entry should be evaluated and added: --- vuln.xml begins here --- <vuln vid="58b58bcc-0f33-11de-ac1e-0022156e8794"> <topic>libxine -- multiple vulnerabilities</topic> <affects> <package> <name>libxine</name> <range><lt>1.1.16.2</lt></range> </package> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> <p>Multiple vulnerabilities were fixed in libxine 1.1.16.2.</p> <p>Tobias Klein reports:</p> <blockquote cite="http://trapkit.de/advisories/TKADV2009-004.txt"> <p>FFmpeg contains a type conversion vulnerability while parsing malformed 4X movie files. The vulnerability may be exploited by a (remote) attacker to execute arbitrary code in the context of FFmpeg or an application using the FFmpeg library.</p> <p>Note: A similar issue also affects xine-lib < version 1.1.16.2.</p> </blockquote> <p>Libxine developers report:</p> <blockquote cite="http://sourceforge.net/project/shownotes.php?group_id=9655&release_id=660071"> <ul> <li>Fix broken size checks in various input plugins (ref. CVE-2008-5239).</li> <li>More malloc checking (ref. CVE-2008-5240).</li> </ul> </blockquote> </body> </description> <references> <cvename>CVE-2009-0698</cvename> <cvename>CVE-2008-5234</cvename> <cvename>CVE-2008-5240</cvename> <url>http://trapkit.de/advisories/TKADV2009-004.txt</url> <url>http://sourceforge.net/project/shownotes.php?release_id=660071</url> </references> <dates> <discovery>2009-02-15</discovery> <entry>TODAY</entry> </dates> </vuln> --- vuln.xml ends here --- >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20090313054606.91303DA820>