Summary: | <media-video/vlc-2.0.5: Buffer overflows in freetype renderer and HTML subtitle parser (CVE-2013-1868) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | kipplasterjoe |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | media-video |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.videolan.org/security/sa1301.html | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
kipplasterjoe
2013-01-05 18:20:04 UTC
(In reply to comment #0) > Current stable VLC is vulnerable, details see here: > http://www.videolan.org/security/sa1301.html Thank you for the report. video herd, may we stabilize =media-video/vlc-2.0.5 ? I did amd64 x86 ppc and ppc64. @Alpha: please stabilise =media-video/vlc-2.0.5 and media-libs/opus-1.0.1 alpha stable Adding to existing GLSA draft after CVE has been assigned. CVE-2013-1868 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1868): Multiple buffer overflows in VideoLAN VLC media player 2.0.4 and earlier allow remote attackers to cause a denial of service (crash) and execute arbitrary code via vectors related to the (1) freetype renderer and (2) HTML subtitle parser. This issue was resolved and addressed in GLSA 201411-01 at http://security.gentoo.org/glsa/glsa-201411-01.xml by GLSA coordinator Sean Amoss (ackle). |