The vulnerabilities are caused due to boundary errors within the "rmff_dump_cont()" function in input/libreal/rmff.c when processing the SDP "Title", "Author", Copyright", and "Abstract" attributes. These can be exploited to cause a heap-based buffer overflow by tricking the user into connecting to a malicious RTSP server. Successful exploitation may allow execution of arbitrary code. The vulnerabilities are confirmed in version 1.1.9. Other versions may also be affected. Solution: no upstream fix avaible, so "Do not connect to untrusted streaming servers."...
Media-video, please advise.
xine-lib 1.1.9.1 is in the tree and candidate for stable, see changelog why there is a -r1 too...
Arches please test and mark stable. Target keywords are: xine-lib-1.1.9.ebuild:KEYWORDS="alpha amd64 arm hppa ia64 ppc ppc64 sparc x86 ~x86-fbsd"
ppc64 done
(In reply to comment #3) > Arches please test and mark stable. Target keywords are: > > xine-lib-1.1.9.ebuild:KEYWORDS="alpha amd64 arm hppa ia64 ppc ppc64 sparc x86 > ~x86-fbsd" > which should be 1.1.9.1 according to the changelog, re-adding ppc64 xine-lib-1.1.9.1.ebuild:KEYWORDS="alpha amd64 arm hppa ia64 ppc ppc64 sparc x86 ~x86-fbsd"
1.1.9.1 done now too. ppc64 stable
ppc stable
x86 stable
Stable for HPPA.
alpha/ia64/sparc stable
amd64 done.
GLSA request filed.
GLSA 200801-12, thanks.