<feed xmlns='http://www.w3.org/2005/Atom'>
<title>xine-lib/src/input, branch 1.1.16.2</title>
<subtitle>xine-lib git mirror
</subtitle>
<link rel='alternate' type='text/html' href='https://vdr-projects.e-tobi.net/git/xine-lib/'/>
<entry>
<title>Fix broken size checks in various input plugins (ref. CVE-2008-5239).</title>
<updated>2009-02-10T17:17:50+00:00</updated>
<author>
<name>Darren Salt</name>
<email>linux@youmustbejoking.demon.co.uk</email>
</author>
<published>2009-02-10T17:17:50+00:00</published>
<link rel='alternate' type='text/html' href='https://vdr-projects.e-tobi.net/git/xine-lib/commit/?id=a0b9021d54dc9890da5f0c9bd26361db4556f6c2'/>
<id>a0b9021d54dc9890da5f0c9bd26361db4556f6c2</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Add allocation checks to the Real MDPR parsing code (ref. CVE-2008-5240).</title>
<updated>2009-01-18T15:10:32+00:00</updated>
<author>
<name>Darren Salt</name>
<email>linux@youmustbejoking.demon.co.uk</email>
</author>
<published>2009-01-18T15:10:32+00:00</published>
<link rel='alternate' type='text/html' href='https://vdr-projects.e-tobi.net/git/xine-lib/commit/?id=bc748211f20d01fc344b8e7c3a5cd158668fbc62'/>
<id>bc748211f20d01fc344b8e7c3a5cd158668fbc62</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Remove '#include "config.h"' from all public header files.</title>
<updated>2009-01-18T00:21:47+00:00</updated>
<author>
<name>Darren Salt</name>
<email>linux@youmustbejoking.demon.co.uk</email>
</author>
<published>2009-01-18T00:21:47+00:00</published>
<link rel='alternate' type='text/html' href='https://vdr-projects.e-tobi.net/git/xine-lib/commit/?id=c8f8261d199af4956aeaf387b2fde41baf905f83'/>
<id>c8f8261d199af4956aeaf387b2fde41baf905f83</id>
<content type='text'>
This requires that many other files include config.h themselves.
Also convert &lt;config.h&gt; to "config.h".
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This requires that many other files include config.h themselves.
Also convert &lt;config.h&gt; to "config.h".
</pre>
</div>
</content>
</entry>
<entry>
<title>Avoid libtool running ldconfig (where not needed) at install time.</title>
<updated>2009-01-17T14:30:50+00:00</updated>
<author>
<name>Darren Salt</name>
<email>linux@youmustbejoking.demon.co.uk</email>
</author>
<published>2009-01-17T14:30:50+00:00</published>
<link rel='alternate' type='text/html' href='https://vdr-projects.e-tobi.net/git/xine-lib/commit/?id=d462ef0ce04d5ca91cd008efecc37c2c1fa39bbb'/>
<id>d462ef0ce04d5ca91cd008efecc37c2c1fa39bbb</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix a broken size check in the pvr input plugin (ref. CVE-2008-5239).</title>
<updated>2009-01-16T18:16:17+00:00</updated>
<author>
<name>Darren Salt</name>
<email>linux@youmustbejoking.demon.co.uk</email>
</author>
<published>2009-01-16T18:16:17+00:00</published>
<link rel='alternate' type='text/html' href='https://vdr-projects.e-tobi.net/git/xine-lib/commit/?id=cc96350ed25b072190267641a6af7974524b6d4e'/>
<id>cc96350ed25b072190267641a6af7974524b6d4e</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fixed lvalue cast error (build with newer mingw compilation tools).</title>
<updated>2009-01-12T18:24:48+00:00</updated>
<author>
<name>František Dvořák</name>
<email>valtri@civ.zcu.cz</email>
</author>
<published>2009-01-12T18:24:48+00:00</published>
<link rel='alternate' type='text/html' href='https://vdr-projects.e-tobi.net/git/xine-lib/commit/?id=7e47a3180c08f2fcaa688ab33cae838d88d8ba0e'/>
<id>7e47a3180c08f2fcaa688ab33cae838d88d8ba0e</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge security fixes.</title>
<updated>2009-01-05T14:50:58+00:00</updated>
<author>
<name>Darren Salt</name>
<email>linux@youmustbejoking.demon.co.uk</email>
</author>
<published>2009-01-05T14:50:58+00:00</published>
<link rel='alternate' type='text/html' href='https://vdr-projects.e-tobi.net/git/xine-lib/commit/?id=5347abe5764b0a0ff3ef1d357ce9934a425758fa'/>
<id>5347abe5764b0a0ff3ef1d357ce9934a425758fa</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix for CVE-2008-5239</title>
<updated>2009-01-04T17:21:46+00:00</updated>
<author>
<name>Matthias Hopf</name>
<email>mhopf@suse.de</email>
</author>
<published>2009-01-04T17:21:46+00:00</published>
<link rel='alternate' type='text/html' href='https://vdr-projects.e-tobi.net/git/xine-lib/commit/?id=0c51806592bae19fbc4f1f6615e5b3f4cb8e7dc3'/>
<id>0c51806592bae19fbc4f1f6615e5b3f4cb8e7dc3</id>
<content type='text'>
xine-lib 1.1.12, and other 1.1.15 and earlier versions, does not
properly handle (a) negative and (b) zero values during unspecified
read function calls in input_file.c, input_net.c, input_smb.c, and
input_http.c, which allows remote attackers to cause a denial of
service (crash) or possibly execute arbitrary code via vectors such as
(1) a file or (2) an HTTP response, which triggers consequences such
as out-of-bounds reads and heap-based buffer overflows.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
xine-lib 1.1.12, and other 1.1.15 and earlier versions, does not
properly handle (a) negative and (b) zero values during unspecified
read function calls in input_file.c, input_net.c, input_smb.c, and
input_http.c, which allows remote attackers to cause a denial of
service (crash) or possibly execute arbitrary code via vectors such as
(1) a file or (2) an HTTP response, which triggers consequences such
as out-of-bounds reads and heap-based buffer overflows.
</pre>
</div>
</content>
</entry>
<entry>
<title>libmms does not handle percent-encoded uri</title>
<updated>2009-01-01T15:42:09+00:00</updated>
<author>
<name>Niels Vorgaard Christensen</name>
<email>vorgaard.c@math.ku.dk</email>
</author>
<published>2009-01-01T15:42:09+00:00</published>
<link rel='alternate' type='text/html' href='https://vdr-projects.e-tobi.net/git/xine-lib/commit/?id=ed75705f86a14bfd255aa5183803e4a6c5ce90c8'/>
<id>ed75705f86a14bfd255aa5183803e4a6c5ce90c8</id>
<content type='text'>
libmms will always fail to request media with URIs containing percent-encoded
characters. This is because the path component in the MMS URI should be
decoded before it is sent to the server.

http://download.microsoft.com/download/9/5/E/95EF66AF-9026-4BB0-A41D-A4F81802D92C/%5BMS-MMSP%5D.pdf
(page 48)
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
libmms will always fail to request media with URIs containing percent-encoded
characters. This is because the path component in the MMS URI should be
decoded before it is sent to the server.

http://download.microsoft.com/download/9/5/E/95EF66AF-9026-4BB0-A41D-A4F81802D92C/%5BMS-MMSP%5D.pdf
(page 48)
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix size of mrls array.</title>
<updated>2008-12-20T01:05:30+00:00</updated>
<author>
<name>Diego E. 'Flameeyes' Pettenò</name>
<email>flameeyes@gmail.com</email>
</author>
<published>2008-12-20T01:05:30+00:00</published>
<link rel='alternate' type='text/html' href='https://vdr-projects.e-tobi.net/git/xine-lib/commit/?id=388558bbbedf8499e696b90ed0eb91d76ed17723'/>
<id>388558bbbedf8499e696b90ed0eb91d76ed17723</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
</feed>
