xine-lib contains two stack-based overflows and one heap-based
overflow. In the code reading VCD disc labels, the ISO disc label is
copied into an unprotected stack buffer of fixed size. Also, there is a
buffer overflow in the code that parses subtitles and prepares them for
display (XSA-2004-4). Finally, xine-lib contains a heap-based overflow
in the DVD sub-picture decoder (XSA-2004-5).
(Please note that the VCD MRL issue mentioned in XSA-2004-4 was fixed
with GLSA 200408-18.)
Impact
With carefully-crafted VCDs, DVDs, MPEGs or subtitles, an attacker may
cause xine-lib to execute arbitrary code with the permissions of the
user.
Workaround
There is no known workaround at this time.
Resolution
All xine-lib users should upgrade to the latest version:
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.