FS#10774 - Buffer overflow in xine-lib 1.1.12
Attached to Project:
Arch Linux
Opened by name withheld (Gullible Jones) - Saturday, 28 June 2008, 03:17 GMT
Last edited by Jan de Groot (JGC) - Sunday, 29 June 2008, 21:51 GMT
Opened by name withheld (Gullible Jones) - Saturday, 28 June 2008, 03:17 GMT
Last edited by Jan de Groot (JGC) - Sunday, 29 June 2008, 21:51 GMT
|
Details
The version of xine-lib currently in the Arch repos contains
a buffer overlow bug which allows denial of service attacks,
and may allow execution of arbitrary code. This bug is fixed
in version 1.1.13:
http://sourceforge.net/project/shownotes.php?release_id=606977&group_id=9655 |
This task depends upon
Comment by
name withheld (Gullible Jones) -
Saturday, 28 June 2008, 03:18 GMT
Crap, posted in wrong place. Can someone move this?