|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2005-2967: xine: remotely exploitable format string bug | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Thomas Biege <thomas> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Critical | ||
| Priority: | P1 - Urgent | CC: | hvogel, patch-request, security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | All | ||
| Whiteboard: | CVE-2005-2967: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) | ||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Attachments: |
xine-lib.formatstring.patch
stable-bugfixes.patch |
||
|
Description
Thomas Biege
2005-10-04 12:59:23 UTC
CAN-2005-2967 From: Ulf Harnhammar <metaur@operamail.com> To: Martin Schulze <joey@infodrom.org> Cc: Free Software Distribution Vendors <vendor-sec@lst.de>, miguel@cetuc.puc-rio.br, mroi@users.sourceforge.net, siggi@users.sourceforge.net Subject: [vendor-sec] Re: xine/gxine CD Player Remote Format String Bug Errors-To: vendor-sec-admin@lst.de Date: Mon, 03 Oct 2005 10:22:17 +0100 > > I have also attached a patch that corrects the problem. > This attachment was missing. OK. I can't generate a new patch from my parents' place, but it's the file src/input/input_cdda.c in xine-lib. It has a line looking like this: fprintf(fd, filecontent); It should be: fprintf(fd, "%s", filecontent); // Ulf Harnhammar Created attachment 51396 [details]
xine-lib.formatstring.patch
From: "Siggi (SourceForge)" <siggi@users.sourceforge.net> To: Michael Roitzsch <mroi@users.sourceforge.net> Cc: Thierry Carrez <koon@gentoo.org>, Ulf Harnhammar <metaur@operamail.com>, Martin Schulze <joey@infodrom.org>, Free Software Distribution Vendors <vendor-sec@lst.de>, Miguel Freitas <miguel@cetuc.puc-rio.br> Subject: Re: [vendor-sec] Re: xine/gxine CD Player Remote Format String Bug Errors-To: vendor-sec-admin@lst.de Date: Tue, 4 Oct 2005 13:42:08 +0200 (CEST) On Tue, 4 Oct 2005, Michael Roitzsch wrote: >>>What about releasing this on the 8th of October? Is that enough time for >>>everyone? >> >>We usually prefer weekdays... October 11th, 1400 UTC ? > >I think the xine team can prepare a new release of xine-lib until then >(most likely over the course of the weekend). > >To the xine team: >Should we make another release from the 1.0 tree for this? It might be too >little time to release from 1.1 (which AFAIR has not been declared stable >by us anyway). Well, we'd commit the fix to both trees of course, and we'd have to release from both trees. The 1.1 release has lower priority, though, as it is officially unstable. Note that this will appear in public CVS as soon as the fix is committed (possibly with a 24h SourceForge delay on the public CVS servers), so this is likely to go public on saturday, even though gentoo security prefers weekdays. (Sorry, I definitely won't be able to do any work on monday/tuesday...) -siggi [xine] Maintenance-Tracker-2516 This bug needs to be fixed quickly. ping Cc: Thierry Carrez <koon@gentoo.org>, "Siggi (SourceForge)" <siggi@users.sourceforge.net>, Martin Schulze <joey@infodrom.org>, Free Software Distribution Vendors <vendor-sec@lst.de>, Miguel Freitas <miguel@cetuc.puc-rio.br> From: Michael Roitzsch <mroi@users.sourceforge.net> Subject: Re: [vendor-sec] Re: xine/gxine CD Player Remote Format String Bug To: Ulf Harnhammar <metaur@operamail.com> Errors-To: vendor-sec-admin@lst.de Date: Sat, 8 Oct 2005 16:47:44 +0200 [-- PGP Ausgabe folgt (aktuelle Zeit: Mo 10 Okt 2005 10:53:27 CEST) --] gpg: Unterschrift vom Sa 08 Okt 2005 16:47:44 CEST, DSA SchlÃŒssel ID 7A560AB6 gpg: Unterschrift kann nicht geprÃŒft werden: Ãffentlicher SchlÃŒssel nicht gefunden [-- Ende der PGP-Ausgabe --] [-- Die folgenden Daten sind signiert --] [-- Anhang #1 --] [-- Typ: text/plain, Kodierung: 7bit, GröÃe: 0,8K --] Hi all, >So did we decide on Saturday? I committed the fix to xine-lib's CVS, so it will be publicly visible in some hours anyway. I think you can just go ahead and release your advisories. We will release xine-lib 1.0.3 soon and most likely xine- lib 1.1.2 later. Both will fix this problem. To the xine team members: I just collected all the *BUGFIX* marked patches (mostly win32 build system changes) from xine-lib HEAD and prepared a patch to backport them (incuding the fix for this vulnerability and the necessary version number changes) to the xine-1_0 branch. I don't know, if this patch works correctly, since I have to leave now. So if someone wants to go ahead and make the 1.0.3 release, you don't have to start from scratch. Michael Created attachment 52066 [details]
stable-bugfixes.patch
ill do it. done for 9.* and 10.0 patchinfos submitted Thanks a lot. packages approved CVE-2005-2967: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) |