[prev in list] [next in list] [prev in thread] [next in thread] 

List:       secunia-sec-adv
Subject:    [SA22200] Mandriva update for xine-lib
From:       Secunia Security Advisories <sec-adv () secunia ! com>
Date:       2006-09-29 18:17:06
Message-ID: 20060929181706.21695.qmail () secunia ! com
[Download RAW message or body]


----------------------------------------------------------------------

Want to work within IT-Security?

Secunia is expanding its team of highly skilled security experts.
We will help with relocation and obtaining a work permit.

Currently the following type of positions are available:
http://secunia.com/quality_assurance_analyst/
http://secunia.com/web_application_security_specialist/ 
http://secunia.com/hardcore_disassembler_and_reverse_engineer/

----------------------------------------------------------------------

TITLE:
Mandriva update for xine-lib

SECUNIA ADVISORY ID:
SA22200

VERIFY ADVISORY:
http://secunia.com/advisories/22200/

CRITICAL:
Highly critical

IMPACT:
DoS, System access

WHERE:
From remote

OPERATING SYSTEM:
Mandriva Linux 2007
http://secunia.com/product/12165/
Mandriva Linux 2006
http://secunia.com/product/9020/

DESCRIPTION:
Mandriva has issued an update for xine-lib. This fixes some
vulnerabilities, which can be exploited by malicious people to cause
a DoS (Denial of Service) and potentially compromise a vulnerable
system.

For more information:
SA22181

SOLUTION:
Apply updated packages.

Mandriva Linux 2006

d1f80d9b93a76660d51ad5df0c8c2e19
2006.0/i586/libxine1-1.1.0-9.7.20060mdk.i586.rpm
f671d0176cf054d166c1e16e874aaaa2
2006.0/i586/libxine1-devel-1.1.0-9.7.20060mdk.i586.rpm
6f0953a17f812a39f95e3b9287b9e069
2006.0/i586/xine-aa-1.1.0-9.7.20060mdk.i586.rpm
42d3d3fb0dacc20837ce9b29e63ee7b4
2006.0/i586/xine-arts-1.1.0-9.7.20060mdk.i586.rpm
730747a34c5c0b257b491c444e8e5d84
2006.0/i586/xine-dxr3-1.1.0-9.7.20060mdk.i586.rpm
15e53a29ac2538c42ac127004d1ace0a
2006.0/i586/xine-esd-1.1.0-9.7.20060mdk.i586.rpm
9a70a80f3a1bc3cd3d58c21ff84a60bb
2006.0/i586/xine-flac-1.1.0-9.7.20060mdk.i586.rpm
c587a6f90f1e0dae31fd2c168f46f7e0
2006.0/i586/xine-gnomevfs-1.1.0-9.7.20060mdk.i586.rpm
bf556f57f35ae3a70157c925cceeadce
2006.0/i586/xine-image-1.1.0-9.7.20060mdk.i586.rpm
6b902ec1c26032f86733e50c0576db20
2006.0/i586/xine-plugins-1.1.0-9.7.20060mdk.i586.rpm
dc86818eeda6ebe99f4c4736aa26915d
2006.0/i586/xine-polyp-1.1.0-9.7.20060mdk.i586.rpm
0f2d148a0b52157e8598ec42c8f2a3c5
2006.0/i586/xine-smb-1.1.0-9.7.20060mdk.i586.rpm
a1727cb46b7790690d8970371538a767
2006.0/SRPMS/xine-lib-1.1.0-9.7.20060mdk.src.rpm

Mandriva Linux 2006/X86_64

d2072c8ed9dc58f785afa6f091368540
2006.0/x86_64/lib64xine1-1.1.0-9.7.20060mdk.x86_64.rpm
4e89998dece0c89eb08e70ff1c463839
2006.0/x86_64/lib64xine1-devel-1.1.0-9.7.20060mdk.x86_64.rpm
8a85f46ca8642413d262a10ccf9d83f5
2006.0/x86_64/xine-aa-1.1.0-9.7.20060mdk.x86_64.rpm
8d5cf41e362c82ff439ac7f016133e3b
2006.0/x86_64/xine-arts-1.1.0-9.7.20060mdk.x86_64.rpm
59d13f29dce4010c44b7ded12bf72b0c
2006.0/x86_64/xine-dxr3-1.1.0-9.7.20060mdk.x86_64.rpm
ff0e3b94866e27e16c0879466edfe8ad
2006.0/x86_64/xine-esd-1.1.0-9.7.20060mdk.x86_64.rpm
dbe2fc276bb83ebadcd60ffe65695600
2006.0/x86_64/xine-flac-1.1.0-9.7.20060mdk.x86_64.rpm
399b3cf66525e55b29efdd7ab2d16f4e
2006.0/x86_64/xine-gnomevfs-1.1.0-9.7.20060mdk.x86_64.rpm
585d0753c5465c3be61374c633b9a849
2006.0/x86_64/xine-image-1.1.0-9.7.20060mdk.x86_64.rpm
caa986167205f61d3b2cd332de8f9ea9
2006.0/x86_64/xine-plugins-1.1.0-9.7.20060mdk.x86_64.rpm
4c8105732f02c99499743baf3a8bee82
2006.0/x86_64/xine-polyp-1.1.0-9.7.20060mdk.x86_64.rpm
92849a576e00179b379d46ad09ef69c6
2006.0/x86_64/xine-smb-1.1.0-9.7.20060mdk.x86_64.rpm
a1727cb46b7790690d8970371538a767
2006.0/SRPMS/xine-lib-1.1.0-9.7.20060mdk.src.rpm

Mandriva Linux 2007

d404c25c046cb8a33c8ad0e2b2072754
2007.0/i586/libxine1-1.1.2-3.1mdv2007.0.i586.rpm
5cc4212e46690c5910f11bb574e073d3
2007.0/i586/libxine1-devel-1.1.2-3.1mdv2007.0.i586.rpm
ac59fa02078f3989ceb189b96cdef41f
2007.0/i586/xine-aa-1.1.2-3.1mdv2007.0.i586.rpm
86efab30b6c71cb3847b5229ca1067ca
2007.0/i586/xine-arts-1.1.2-3.1mdv2007.0.i586.rpm
3d731488c545b27e1295e758e3f674ac
2007.0/i586/xine-dxr3-1.1.2-3.1mdv2007.0.i586.rpm
c85c713e002fe6009eef3a8ce191ca73
2007.0/i586/xine-esd-1.1.2-3.1mdv2007.0.i586.rpm
af8bf9bd553334e8bce2dbc257fb2ce9
2007.0/i586/xine-flac-1.1.2-3.1mdv2007.0.i586.rpm
8da4facf9142237c874da9790f44e014
2007.0/i586/xine-gnomevfs-1.1.2-3.1mdv2007.0.i586.rpm
da7022eb9498f9dba321893fc35378a4
2007.0/i586/xine-image-1.1.2-3.1mdv2007.0.i586.rpm
6dfe4067a98de2e9344752ec369149bb
2007.0/i586/xine-plugins-1.1.2-3.1mdv2007.0.i586.rpm
89a7386ed3c2b821f9dd2715d23699c2
2007.0/i586/xine-sdl-1.1.2-3.1mdv2007.0.i586.rpm
6a8c17bd9d98744c57ddb5b12d78d197
2007.0/i586/xine-smb-1.1.2-3.1mdv2007.0.i586.rpm
eb3473147c0d7cdfa3b0d48ff37dc61a
2007.0/SRPMS/xine-lib-1.1.2-3.1mdv2007.0.src.rpm

Mandriva Linux 2007/X86_64

bdd79df2e0097f84a2f5772c4ca6136f
2007.0/x86_64/lib64xine1-1.1.2-3.1mdv2007.0.x86_64.rpm
6ba8f3c17541fd13ac77d55120758042
2007.0/x86_64/lib64xine1-devel-1.1.2-3.1mdv2007.0.x86_64.rpm
d71799253d4c012e1e3f64d3bc58d7cc
2007.0/x86_64/xine-aa-1.1.2-3.1mdv2007.0.x86_64.rpm
9d39171f79b30e7eb4c8ca2370e483b5
2007.0/x86_64/xine-arts-1.1.2-3.1mdv2007.0.x86_64.rpm
246c0799945641ea013cc41b5409deea
2007.0/x86_64/xine-dxr3-1.1.2-3.1mdv2007.0.x86_64.rpm
dcc81b8d0ba73799019e2d8638d5ec20
2007.0/x86_64/xine-esd-1.1.2-3.1mdv2007.0.x86_64.rpm
f3d6cf4c186265c72b235bf20817de9d
2007.0/x86_64/xine-flac-1.1.2-3.1mdv2007.0.x86_64.rpm
57684a9c46601d685fb2a00bdc01eddd
2007.0/x86_64/xine-gnomevfs-1.1.2-3.1mdv2007.0.x86_64.rpm
fdf75b1bcaecb2f49fddd40d96a75ea7
2007.0/x86_64/xine-image-1.1.2-3.1mdv2007.0.x86_64.rpm
3c8f9ab5f54574b6c1ac04e494597631
2007.0/x86_64/xine-plugins-1.1.2-3.1mdv2007.0.x86_64.rpm
fa5133b6f2543e6de6425efcbd7cd435
2007.0/x86_64/xine-sdl-1.1.2-3.1mdv2007.0.x86_64.rpm
fd42d77bf716df6f53fb3dd4093bdafc
2007.0/x86_64/xine-smb-1.1.2-3.1mdv2007.0.x86_64.rpm
eb3473147c0d7cdfa3b0d48ff37dc61a
2007.0/SRPMS/xine-lib-1.1.2-3.1mdv2007.0.src.rpm

ORIGINAL ADVISORY:
http://www.mandriva.com/security/advisories?name=MDKSA-2006:176

OTHER REFERENCES:
SA22181:
http://secunia.com/advisories/22181/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=secunia-sec-adv%40progressive-comp.com

----------------------------------------------------------------------
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic