Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#10774 - Buffer overflow in xine-lib 1.1.12
Attached to Project:
Arch Linux
Opened by name withheld (Gullible Jones) - Saturday, 28 June 2008, 03:17 GMT
Last edited by Jan de Groot (JGC) - Sunday, 29 June 2008, 21:51 GMT
Opened by name withheld (Gullible Jones) - Saturday, 28 June 2008, 03:17 GMT
Last edited by Jan de Groot (JGC) - Sunday, 29 June 2008, 21:51 GMT
|
DetailsThe version of xine-lib currently in the Arch repos contains a buffer overlow bug which allows denial of service attacks, and may allow execution of arbitrary code. This bug is fixed in version 1.1.13:
http://sourceforge.net/project/shownotes.php?release_id=606977&group_id=9655 |
This task depends upon
Comment by name withheld (Gullible Jones) -
Saturday, 28 June 2008, 03:18 GMT
Crap, posted in wrong place. Can someone move this?