Gentoo Logo

xine-lib: Multiple vulnerabilities


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200409-30 / xine-lib
Release Date September 22, 2004
Latest Revision May 22, 2006: 02
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
media-libs/xine-lib <= 1_rc5-r3 >= 1_rc6 All supported architectures

Related bugreports: #64348


xine-lib contains several vulnerabilities potentially allowing the execution of arbitrary code.

2.  Impact Information


xine-lib is a multimedia library which can be utilized to create multimedia frontends.


xine-lib contains two stack-based overflows and one heap-based overflow. In the code reading VCD disc labels, the ISO disc label is copied into an unprotected stack buffer of fixed size. Also, there is a buffer overflow in the code that parses subtitles and prepares them for display (XSA-2004-4). Finally, xine-lib contains a heap-based overflow in the DVD sub-picture decoder (XSA-2004-5).

(Please note that the VCD MRL issue mentioned in XSA-2004-4 was fixed with GLSA 200408-18.)


With carefully-crafted VCDs, DVDs, MPEGs or subtitles, an attacker may cause xine-lib to execute arbitrary code with the permissions of the user.

3.  Resolution Information


There is no known workaround at this time.


All xine-lib users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge sync

# emerge -pv ">=media-libs/xine-lib-1_rc6"
# emerge ">=media-libs/xine-lib-1_rc6"

4.  References


Page updated September 22, 2004

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.