English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 148472 CVE descriptions
and 72306 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  xine-lib (SSA:2005-121-02)

New xine-lib packages are available for Slackware 10.0, 10.1, and -current to
fix security issues.  The xine frontends have also been upgraded.

For more details on the xine-lib security issues, see:
  http://xinehq.de/index.php/security/XSA-2004-8


Here are the details from the Slackware 10.1 ChangeLog:
+--------------------------+
patches/packages/xine-lib-1.0.1-i686-1.tgz:  Upgraded to xine-lib-1.0.1.
  This fixes some bugs in the MMS and Real RTSP streaming client code.
  While the odds of this vulnerability being usable to a remote attacker are
  low (but see the xine advisory), if you stream media from sites using these
  protocols (and you think the sites might be "hostile" and will try to hack
  into your xine client), then you might want to upgrade to this new version
  of xine-lib.  Probably the other fixes and enchancements in xine-lib-1.0.1
  are a better rationale to do so, though.
  For more details on the xine-lib security issues, see:
    http://xinehq.de/index.php/security/XSA-2004-8
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Updated packages for Slackware 10.0:
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/gxine-0.4.4-i486-1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/xine-lib-1.0.1-i686-1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/xine-ui-0.99.3-i686-1.tgz

Updated packages for Slackware 10.1:
ftp://ftp.slackware.com/pub/slackware/slackware-10.1/patches/packages/gxine-0.4.4-i486-1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-10.1/patches/packages/xine-lib-1.0.1-i686-1.tgz

Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/gxine-0.4.4-i486-1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/xine-lib-1.0.1-i686-1.tgz


MD5 signatures:
+-------------+

Slackware 10.0 packages:
5d4aa5dda0ae61ccec4ffb170a85de64  gxine-0.4.4-i486-1.tgz
8be40e61d91bee8d79d0da5693fd663f  xine-lib-1.0.1-i686-1.tgz
935e7d9c8da3ac159aaf5ca44bfb4d2e  xine-ui-0.99.3-i686-1.tgz

Slackware 10.1 packages:
12181793dd01d778368df28a1e889264  gxine-0.4.4-i486-1.tgz
22bff793d373875ac9e8377733e3186e  xine-lib-1.0.1-i686-1.tgz

Slackware -current packages:
a0b0754ad3767c4bdfd76b1cf23862c7  gxine-0.4.4-i486-1.tgz
c17c93bcfe461956d0b38b13836afeab  xine-lib-1.0.1-i686-1.tgz


Installation instructions:
+------------------------+

Upgrade the xine-lib package as root:
# upgradepkg xine-lib-1.0.1-i686-1.tgz

The xine-lib frontends (xine-ui and gxine) have been upgraded as well
(but these are optional upgrades that do not fix any known security
issues.)  Upgrade these in the same way:

# upgradepkg gxine-0.4.4-i486-1.tgz xine-ui-0.99.3-i686-1.tgz


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+------------------------------------------------------------------------+
| To leave the slackware-security mailing list:                          |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message:                                                     |
|                                                                        |
|   unsubscribe slackware-security                                       |
|                                                                        |
| You will get a confirmation message back containing instructions to    |
| complete the process.  Please do not reply to this email address.      |
+------------------------------------------------------------------------+

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.7 (GNU/Linux)

iD8DBQFCddJyakRjwEAQIjMRAjhyAJ934K8XVq3ppZerqnIx/0U1Y7KlvACglNE3
BcnuJ58ZoQQ60CC9V6O/L8M=
=CKln
-----END PGP SIGNATURE-----

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.