---------------------------------------------------------------------- Want to join the Secunia Security Team? Secunia offers a position as a security specialist, where your daily work involves reverse engineering of software and exploit code, auditing of source code, and analysis of vulnerability reports. http://secunia.com/secunia_security_specialist/ ---------------------------------------------------------------------- TITLE: Ubuntu update for xine-lib SECUNIA ADVISORY ID: SA20549 VERIFY ADVISORY: http://secunia.com/advisories/20549/ CRITICAL: Not critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Ubuntu Linux 5.10 http://secunia.com/product/6606/ Ubuntu Linux 5.04 http://secunia.com/product/5036/ DESCRIPTION: Ubuntu has issued an update for xine-lib. This fixes a weakness, which can be exploited by malicious people to crash certain applications on a user's system. For more information: SA20369 SOLUTION: Apply updated packages. -- Ubuntu 5.04 -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/xine-lib_1.0-1ubuntu3.7.diff.gz Size/MD5: 4636 5cc6919bd457df6beae53e9a84e9e503 http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/xine-lib_1.0-1ubuntu3.7.dsc Size/MD5: 1070 1a862dac447d52ecfb8bcdcbb24cf5de http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/xine-lib_1.0.orig.tar.gz Size/MD5: 7384258 96e5195c366064e7778af44c3e71f43a amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine-dev_1.0-1ubuntu3.7_amd64.deb Size/MD5: 106846 edbbcd4d032bb0e3ff692ac7138fe2fb http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine1_1.0-1ubuntu3.7_amd64.deb Size/MD5: 3567510 0d1ba9ac491e5482d82acb2f776f21bb i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine-dev_1.0-1ubuntu3.7_i386.deb Size/MD5: 106822 86c3f51b3200996f96131c8c53c67506 http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine1_1.0-1ubuntu3.7_i386.deb Size/MD5: 3750458 eff585a1e98695ae4146cd97c7560fcf powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine-dev_1.0-1ubuntu3.7_powerpc.deb Size/MD5: 106850 9097246c8357d5a04139bcee0ddbb7b8 http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine1_1.0-1ubuntu3.7_powerpc.deb Size/MD5: 3925536 8d2576a78270fb2806a18e011a18921a -- Ubuntu 5.10 -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/xine-lib_1.0.1-1ubuntu10.3.diff.gz Size/MD5: 9453 2a3b01a6d858e8623a89e5cce831d392 http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/xine-lib_1.0.1-1ubuntu10.3.dsc Size/MD5: 1186 47fb3762575e25d037c3e6ba2d3d6744 http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/xine-lib_1.0.1.orig.tar.gz Size/MD5: 7774954 9be804b337c6c3a2e202c5a7237cb0f8 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine-dev_1.0.1-1ubuntu10.3_amd64.deb Size/MD5: 108858 8081b6beb283dfefeda7aa0a81d5008e http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine1c2_1.0.1-1ubuntu10.3_amd64.deb Size/MD5: 3611122 99e0979785b3c7c7001d33ddd5e8bb96 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine-dev_1.0.1-1ubuntu10.3_i386.deb Size/MD5: 108864 7dfd068cc168dcc55993d70277901b3d http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine1c2_1.0.1-1ubuntu10.3_i386.deb Size/MD5: 4004210 156188682cd24dbfa922b94d66d2dd63 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine-dev_1.0.1-1ubuntu10.3_powerpc.deb Size/MD5: 108866 1489e831ed6bb874756e0f2f4a44ecca http://security.ubuntu.com/ubuntu/pool/main/x/xine-lib/libxine1c2_1.0.1-1ubuntu10.3_powerpc.deb Size/MD5: 3849668 6fdbbe888f1c7ee821af81e16352d61b ORIGINAL ADVISORY: http://www.ubuntu.com/usn/usn-295-1 OTHER REFERENCES: SA20369: http://secunia.com/advisories/20369/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------