xine-lib: Buffer overflow
Gentoo Linux Security Advisory
||GLSA 200612-02 / xine-lib
||December 09, 2006
||December 09, 2006: 01
All supported architectures
xine-lib is vulnerable to a buffer overflow in the Real Media input plugin,
which could lead to the execution of arbitrary code.
xine is a portable and reusable multimedia playback engine. xine-lib is
xine's core engine.
A possible buffer overflow has been reported in the Real Media input
An attacker could exploit this vulnerability by enticing a user into
loading a specially crafted stream with xine or an application using
xine-lib. This can lead to a Denial of Service and possibly the
execution of arbitrary code with the rights of the user running the
There is no known workaround at this time.
All xine-lib users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.2-r3"