Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <5145BCA6.9060501@gentoo.org>
Date: Sun, 17 Mar 2013 08:52:54 -0400
From: Sean Amoss <ackle@...too.org>
To: oss-security@...ts.openwall.com
Subject: CVE Request: VLC Buffer overflows

It looks like this issue has not been assigned a CVE ID:

VLC media player 2.0.5 addresses buffer overflow flaws in the freetype
renderer and HTML subtitle parser.

Reference:
http://www.videolan.org/security/sa1301.html

Upstream fix:
http://git.videolan.org/?p=vlc/vlc-2.0.git;a=commitdiff;h=9b0414dc7f5c18ff2951175cf076779c444efd70


Thanks,
Sean

-- 
Sean Amoss
Gentoo Security | GLSA Coordinator
E-Mail	  : ackle@...too.org
GnuPG FP  : E58A AABD DD2D 03AF 0A7A 2F14 1877 72EC E928 357A


Download attachment "signature.asc" of type "application/pgp-signature" (295 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.