This bug was fixed in the package xine-lib - 1.1.7-1ubuntu1.5
--------------- xine-lib (1.1.7-1ubuntu1.5) gutsy-security; urgency=low
* REGRESSION: Broken size checks in CVE-2008-5239 input plugins patch (LP: #322834) - src/input/input_*.c: fix the size checks broken by the previous security update. - http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=b11cc37934629a2965859163db6095fbbe2b44be;style=gitweb - CVE-2008-5239 * SECURITY UPDATE: Integer overflow in the 4xm demuxer - src/demuxers/demux_4xm.c: Make sure we don't overflow fourxm->track_count. - http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=ba872682eba8a10217c48b7fe21f0fa763ef4af3;style=gitweb - CVE-2009-0698
-- Marc Deslauriers <email address hidden> Tue, 24 Mar 2009 10:16:54 -0400
This bug was fixed in the package xine-lib - 1.1.7-1ubuntu1.5
---------------
xine-lib (1.1.7-1ubuntu1.5) gutsy-security; urgency=low
* REGRESSION: Broken size checks in CVE-2008-5239 input plugins patch input_* .c: fix the size checks broken by the previous hg.debian. org/hg/ xine-lib/ xine-lib? cmd=changeset; node=b11cc37934 629a2965859163d b6095fbbe2b44be ;style= gitweb demux_4xm. c: Make sure we don't overflow >track_ count. hg.debian. org/hg/ xine-lib/ xine-lib? cmd=changeset; node=ba872682eb a8a10217c48b7fe 21f0fa763ef4af3 ;style= gitweb
(LP: #322834)
- src/input/
security update.
- http://
- CVE-2008-5239
* SECURITY UPDATE: Integer overflow in the 4xm demuxer
- src/demuxers/
fourxm-
- http://
- CVE-2009-0698
-- Marc Deslauriers <email address hidden> Tue, 24 Mar 2009 10:16:54 -0400