[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

RE: [alerts-security] [SECURITY] [DSA 2973-1] vlc security update



N/A

-----Original Message-----
From: mendix-alerts-security [mailto:mendix-alerts-security-bounces@lists.knorrie.org] On Behalf Of Moritz Muehlenhoff
Sent: Monday, July 07, 2014 11:38 PM
To: debian-security-announce@lists.debian.org
Subject: [alerts-security] [SECURITY] [DSA 2973-1] vlc security update
Importance: High

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2973-1                   security@debian.org
http://www.debian.org/security/                        Moritz Muehlenhoff
July 07, 2014                          http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : vlc
CVE ID         : CVE-2013-1868 CVE-2013-1954 CVE-2013-4388

Multiple buffer overflows have been found in the VideoLAN media player.
Processing malformed subtitles or movie files could lead to denial of service and potentially the execution of arbitrary code.

For the stable distribution (wheezy), these problems have been fixed in version 2.0.3-5+deb7u1.

For the testing distribution (jessie), these problems have been fixed in version 2.1.0-1.

For the unstable distribution (sid), these problems have been fixed in version 2.1.0-1.

We recommend that you upgrade your vlc packages.

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBAgAGBQJTuxLyAAoJEBDCk7bDfE422awP/A6q2UrLQI47VDpmNhym/iq8
xTaHDKVOg9liWJ/tcM5Pkm76lCkHabMhCbnajLmGHWDbJUarjgHoDdhJdeW6GtT9
2HOd9uWx0s64X5hy8jfS++2t8zEb3ZIQ+OpZC0vTj/6nbMYuO6+OR67ONLUIzRFa
tFRaitIT6C10hUUkI9ybY5oin9ixDYs/T4UFVJ+iq7SoREJsngg3U4cmJPIueYQ8
5xYaSDWUXzW2+/VlNTyOkYRQ02by2Q4YPMy/Y8ON/Xfey6Awy59mag2TFfpUBUFk
lJGYxR8gtwGx4KFMJiNde3HvVzpiT6W2X5S02URMYmV5APkgkF9UvAaQLk/YnnR4
rKKtEmV21ec1wVrTYXAPA/R4/TrMb2/tJ5/yYxywTmNl74NoqRPHOpgyzp6wCMmO
9hdFWR7CZrVe2X1TL48W5S/carvkfra3ZW66hbFao7h4lmQ/9SoZGb8dps6qxONt
omcuPDoSuVljtbr/t+na82v1BXX/k4o/7uWQ94KbTqaMjVEf4yC37yokb7a2ngXP
r7AJ/BHJGvsIo4y1Ccv4BxWqQ3ii5EogTyR8/S4v2O7lhvn2JOMWzGcCvf/d8qgM
lGajkIWSpGlH+FrcaZXojzbwAFTJjZwewH7uxBLIAewz654GzXqStYO8uQ220vjA
vTesFwVSjcZR8Gvmz7Jb
=K5Fy
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: https://lists.debian.org/20140707213810.GA3239@pisco.westfalen.local


Reply to: