exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2008-124

Mandriva Linux Security Advisory 2008-124
Posted Jun 27, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A vulnerability in the Speex library was found where it did not properly validate input values read from the Speex files headers. An attacker could create a malicious Speex file that would crash an application or potentially allow the execution of arbitrary code with the privileges of the application calling the Speex library. Xine-lib is similarly affected by this issue. As well, the previous version of xine as provided in Mandriva Linux 2008.1 would crash when playing matroska files, and a regression was introduced that prevented Amarok from playing m4a files.

tags | advisory, arbitrary
systems | linux, mandriva
advisories | CVE-2008-1686
SHA-256 | b9114596a257e540de4ed397de2c1f36b64ef52b63ecd564ab390dd4848ec7e5

Mandriva Linux Security Advisory 2008-124

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2008:124
http://www.mandriva.com/security/
_______________________________________________________________________

Package : xine-lib
Date : June 26, 2008
Affected: 2008.0, 2008.1
_______________________________________________________________________

Problem Description:

A vulnerability in the Speex library was found where it did not
properly validate input values read from the Speex files headers.
An attacker could create a malicious Speex file that would crash an
application or potentially allow the execution of arbitrary code
with the privileges of the application calling the Speex library
(CVE-2008-1686).

Xine-lib is similarly affected by this issue.

As well, the previous version of xine as provided in Mandriva Linux
2008.1 would crash when playing matroska files, and a regression was
introduced that prevented Amarok from playing m4a files.

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1686
http://qa.mandriva.com/show_bug.cgi?id=39768
http://qa.mandriva.com/show_bug.cgi?id=40928
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.0:
ad845d6dc3353c1ca97f5aa95d992ff1 2008.0/i586/libxine1-1.1.8-4.6mdv2008.0.i586.rpm
ae9a07c197291e8a274a276946c5b757 2008.0/i586/libxine-devel-1.1.8-4.6mdv2008.0.i586.rpm
b9b9ce8553746b0628b4183ea2ce4b6d 2008.0/i586/xine-aa-1.1.8-4.6mdv2008.0.i586.rpm
17c32afdfbde86f0f31097f984177d65 2008.0/i586/xine-caca-1.1.8-4.6mdv2008.0.i586.rpm
fbd3c46574aa4ffbe8cb406c4dc88417 2008.0/i586/xine-dxr3-1.1.8-4.6mdv2008.0.i586.rpm
f9d4d16bb9f172cf493b739bb454e9df 2008.0/i586/xine-esd-1.1.8-4.6mdv2008.0.i586.rpm
558accfe2cc33255ccad98d6a8441064 2008.0/i586/xine-flac-1.1.8-4.6mdv2008.0.i586.rpm
264cc6cdbce7b1f6c83e343c187cb509 2008.0/i586/xine-gnomevfs-1.1.8-4.6mdv2008.0.i586.rpm
2aed56b1bbd7a6c3354fe75f53b4f3e2 2008.0/i586/xine-image-1.1.8-4.6mdv2008.0.i586.rpm
e05266e2becad52ebda0cb8c02ae13b3 2008.0/i586/xine-jack-1.1.8-4.6mdv2008.0.i586.rpm
016e9b18b74eed89bf2f200e7174b3cb 2008.0/i586/xine-plugins-1.1.8-4.6mdv2008.0.i586.rpm
b3346291b6428d1add2fa62055cd492a 2008.0/i586/xine-pulse-1.1.8-4.6mdv2008.0.i586.rpm
12346f664080c9cf162f235de7f91ad4 2008.0/i586/xine-sdl-1.1.8-4.6mdv2008.0.i586.rpm
36965664cca748ae612cc6d178122ae8 2008.0/i586/xine-smb-1.1.8-4.6mdv2008.0.i586.rpm
ac597fd40a0b449cd4f1692ccb759572 2008.0/SRPMS/xine-lib-1.1.8-4.6mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
b1cb0d0f17d17c4c82040f8688019578 2008.0/x86_64/lib64xine1-1.1.8-4.6mdv2008.0.x86_64.rpm
ea2ea3354c51cb308334b5ba29e23a18 2008.0/x86_64/lib64xine-devel-1.1.8-4.6mdv2008.0.x86_64.rpm
624b0ccb940a022fd4aeda527df52bf5 2008.0/x86_64/xine-aa-1.1.8-4.6mdv2008.0.x86_64.rpm
c50654970f441adf19bb3df7b63552a9 2008.0/x86_64/xine-caca-1.1.8-4.6mdv2008.0.x86_64.rpm
1dc6495f61075962070fa17686ab4672 2008.0/x86_64/xine-dxr3-1.1.8-4.6mdv2008.0.x86_64.rpm
90f792c06169cb9856a4fc5ff3755107 2008.0/x86_64/xine-esd-1.1.8-4.6mdv2008.0.x86_64.rpm
00caa1c8cfd859ced79bd4917306aa5f 2008.0/x86_64/xine-flac-1.1.8-4.6mdv2008.0.x86_64.rpm
5c03fc3b2167d7a10d6fbb63011bfb76 2008.0/x86_64/xine-gnomevfs-1.1.8-4.6mdv2008.0.x86_64.rpm
df2406c34d7d157d3eaaa644b07833c1 2008.0/x86_64/xine-image-1.1.8-4.6mdv2008.0.x86_64.rpm
76983bf74762c4bd66f849823ac2f553 2008.0/x86_64/xine-jack-1.1.8-4.6mdv2008.0.x86_64.rpm
dd31feadafd83e1f454627064ebca047 2008.0/x86_64/xine-plugins-1.1.8-4.6mdv2008.0.x86_64.rpm
458aeeac225e2c46dcda2a7f5e74701a 2008.0/x86_64/xine-pulse-1.1.8-4.6mdv2008.0.x86_64.rpm
fac50b5c5b9de0862c01344e7a6c0be6 2008.0/x86_64/xine-sdl-1.1.8-4.6mdv2008.0.x86_64.rpm
bf1935546d1de8e7df0c05076a1605bd 2008.0/x86_64/xine-smb-1.1.8-4.6mdv2008.0.x86_64.rpm
ac597fd40a0b449cd4f1692ccb759572 2008.0/SRPMS/xine-lib-1.1.8-4.6mdv2008.0.src.rpm

Mandriva Linux 2008.1:
eeb22b316f3d0bdd9955b5a2ca0c2b03 2008.1/i586/libxine1-1.1.11.1-4.1mdv2008.1.i586.rpm
69c0fbda734b369c97681226b81e2222 2008.1/i586/libxine-devel-1.1.11.1-4.1mdv2008.1.i586.rpm
11bb713825922a33db78225abc311aac 2008.1/i586/xine-aa-1.1.11.1-4.1mdv2008.1.i586.rpm
aaee08af70d438550e402189d0234cec 2008.1/i586/xine-caca-1.1.11.1-4.1mdv2008.1.i586.rpm
c803ac9dc7d0cf116bc10c5f14b8ed2e 2008.1/i586/xine-dxr3-1.1.11.1-4.1mdv2008.1.i586.rpm
e3c997f1133f1771135e547555e1ca59 2008.1/i586/xine-esd-1.1.11.1-4.1mdv2008.1.i586.rpm
ce3a12266a4f02ce88cc722e4a1d6b37 2008.1/i586/xine-flac-1.1.11.1-4.1mdv2008.1.i586.rpm
2e8612901990c5cd3fcb914c4acef7ec 2008.1/i586/xine-gnomevfs-1.1.11.1-4.1mdv2008.1.i586.rpm
dc3cd131c7b7f78bc30b59fe8c16644f 2008.1/i586/xine-image-1.1.11.1-4.1mdv2008.1.i586.rpm
22535a08aabcd7b2966d19d06c6e902f 2008.1/i586/xine-jack-1.1.11.1-4.1mdv2008.1.i586.rpm
eb17455995a3d8c43ff5ce8f33874f5a 2008.1/i586/xine-plugins-1.1.11.1-4.1mdv2008.1.i586.rpm
3cf5abf164c2eb4669d693bc8045e0eb 2008.1/i586/xine-pulse-1.1.11.1-4.1mdv2008.1.i586.rpm
2a2cb49ab2e45a345ee21742f151e58f 2008.1/i586/xine-sdl-1.1.11.1-4.1mdv2008.1.i586.rpm
14928bb6d625aa65130be890b27745e0 2008.1/i586/xine-smb-1.1.11.1-4.1mdv2008.1.i586.rpm
943a02cdd396ac7645622dff0eeec140 2008.1/i586/xine-wavpack-1.1.11.1-4.1mdv2008.1.i586.rpm
c0d83761ba92778f6dbc87e581119a71 2008.1/SRPMS/xine-lib-1.1.11.1-4.1mdv2008.1.src.rpm

Mandriva Linux 2008.1/X86_64:
d1ac37f198a848d49cda7880dcc23102 2008.1/x86_64/lib64xine1-1.1.11.1-4.1mdv2008.1.x86_64.rpm
ea6903d6592b1d5922a102a93ca6ea99 2008.1/x86_64/lib64xine-devel-1.1.11.1-4.1mdv2008.1.x86_64.rpm
9e90e2ad00a78832bd578fc15f9f8b13 2008.1/x86_64/xine-aa-1.1.11.1-4.1mdv2008.1.x86_64.rpm
6ae941e81d86abf75b39d7006dc9734d 2008.1/x86_64/xine-caca-1.1.11.1-4.1mdv2008.1.x86_64.rpm
a59961f56512404d607efacffa5793c4 2008.1/x86_64/xine-dxr3-1.1.11.1-4.1mdv2008.1.x86_64.rpm
01f42963ea50d644e7351790b8a24b94 2008.1/x86_64/xine-esd-1.1.11.1-4.1mdv2008.1.x86_64.rpm
d7c790f3019049aaf14714f38b3d81ac 2008.1/x86_64/xine-flac-1.1.11.1-4.1mdv2008.1.x86_64.rpm
2c12d76b5848845ad4de5c1bdf7a32ad 2008.1/x86_64/xine-gnomevfs-1.1.11.1-4.1mdv2008.1.x86_64.rpm
628ae9d2ac10eaf6d3b02dd0ba2abcae 2008.1/x86_64/xine-image-1.1.11.1-4.1mdv2008.1.x86_64.rpm
c008ce2ab72809ab87d93c23deb4d195 2008.1/x86_64/xine-jack-1.1.11.1-4.1mdv2008.1.x86_64.rpm
559544de22e927b9d28d244b029e0d54 2008.1/x86_64/xine-plugins-1.1.11.1-4.1mdv2008.1.x86_64.rpm
24b4fe41ecaf1f4d91ecbce88ab61b67 2008.1/x86_64/xine-pulse-1.1.11.1-4.1mdv2008.1.x86_64.rpm
64ba32889ddf4c0c9664d49b06efe607 2008.1/x86_64/xine-sdl-1.1.11.1-4.1mdv2008.1.x86_64.rpm
8867bb990ec77a42ea20886d3500d94d 2008.1/x86_64/xine-smb-1.1.11.1-4.1mdv2008.1.x86_64.rpm
b10ee4d5faa7e8379d0d9cb6d02c74f1 2008.1/x86_64/xine-wavpack-1.1.11.1-4.1mdv2008.1.x86_64.rpm
c0d83761ba92778f6dbc87e581119a71 2008.1/SRPMS/xine-lib-1.1.11.1-4.1mdv2008.1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFIY/TZmqjQ0CJFipgRAjh9AJ908v/XFv77z2Mtn+TOViX70b6pFQCgxsvQ
r32dc/MX7NEK0SjVT6EvrD8=
=d+Iw
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close