diff options
author | Matthias Hopf <mhopf@suse.de> | 2009-01-04 17:21:46 +0000 |
---|---|---|
committer | Matthias Hopf <mhopf@suse.de> | 2009-01-04 17:21:46 +0000 |
commit | 49d4eec32b8c05eadfaf9c42b3dcd7407815fd9a (patch) | |
tree | 29c869a4bed2658fa30664ae6309ad2f63a9d5dd /m4 | |
parent | b108d0826de0fc395a0d3eb2e5612a20df6cf334 (diff) | |
download | xine-lib-49d4eec32b8c05eadfaf9c42b3dcd7407815fd9a.tar.gz xine-lib-49d4eec32b8c05eadfaf9c42b3dcd7407815fd9a.tar.bz2 |
Fix for CVE-2008-5237
Multiple integer overflows in xine-lib 1.1.12, and other 1.1.15 and
earlier versions, allow remote attackers to cause a denial of service
(crash) or possibly execute arbitrary code via (1) crafted width and
height values that are not validated by the mymng_process_header
function in demux_mng.c before use in an allocation calculation or (2)
crafted current_atom_size and string_size values processed by the
parse_reference_atom function in demux_qt.c.
Diffstat (limited to 'm4')
0 files changed, 0 insertions, 0 deletions