Stefan Fritsch wrote:
> Package: libxine1
> Version: 1.1.1-1
> Severity: grave
> Tags: security
> Justification: user security hole
> 
> 
> 
> According to CVE-2006-1664, there is a "buffer overflow in
> xine_list_delete_current in libxine 1.14 and earlier, as distributed
> in xine-lib 1.1.1 and earlier, allows remote attackers to execute
> arbitrary code via a crafted MPEG stream."

Are you able to reproduce this?  If so, we need your help as I
can't since xine pretends not to know about the file format of the
created egg file.  However, I was using xine instead of gxine since
the latter is not available in Debian.  Maybe some non-free
decoders are required?  In that case, Debian is not vulnerable
per definition since they aren't shipped by Debian.

Regards,

        Joey

-- 
Experience is something you don't get until just after you need it.

Please always Cc to me when replying to me on the lists.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to