Hi Salvatore On 2019-07-16 22:36:50, Salvatore Bonaccorso wrote: > Source: vlc > Version: 3.0.7.1-2 > Severity: important > Tags: security upstream > Forwarded: https://trac.videolan.org/vlc/ticket/22474 > Control: found -1 3.0.7.1-1 > Control: found -1 3.0.7-1 > Control: found -1 3.0.7-0+deb9u1 > > Hi, > > The following vulnerability was published for vlc, sorry another one. > For buster, stretch I think we can follow the usual strategy and > release a new upstream stable version once available. > > CVE-2019-13615[0]: > | VideoLAN VLC media player 3.0.7.1 has a heap-based buffer over-read in > | mkv::demux_sys_t::FreeUnused() in modules/demux/mkv/demux.cpp when > | called from mkv::Open in modules/demux/mkv/mkv.cpp. > > > If you fix the vulnerability please also make sure to include the > CVE (Common Vulnerabilities & Exposures) id in your changelog entry. > > For further information see: > > [0] https://security-tracker.debian.org/tracker/CVE-2019-13615 > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13615 > [1] https://trac.videolan.org/vlc/ticket/22474 FWIW, this issue is disputed upstream. Cheers > > Please adjust the affected versions in the BTS as needed. > > Regards, > Salvatore > -- Sebastian Ramacher
Attachment:
signature.asc
Description: PGP signature