Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 10 Nov 2008 21:10:47 +0100
From: Nico Golde <>
Subject: Re: CVE id request: vlc

* Steven M. Christey <> [2008-11-10 19:09]:
> ======================================================
> Name: CVE-2008-5032
> Status: Candidate
> URL:
> Reference: MLIST:[oss-security] 20081105 CVE id request: vlc
> Reference: URL:
> Reference: MLIST:[oss-security] 20081105 VideoLAN security advisory 0810
> Reference: URL:
> Reference: MISC:
> Reference: MISC:
> Reference: CONFIRM:;a=commitdiff;h=5f63f1562d43f32331006c2c1a61742de031b84d
> Reference: CONFIRM:;a=commitdiff;h=e3cef651125701a2e33a8d75b815b3e39681a447
> Reference: CONFIRM:
> Multiple stack-based buffer overflows in VideoLAN VLC media player
> 0.5.0 through 0.9.5 allow user-assisted attackers to execute arbitrary
> code via (1) the header of an invalid CUE image file, related to
> modules/access/vcd/cdrom.c; or (2) an invalid RealText (rt) subtitle
> file, related to the ParseRealText function in
> modules/demux/subtitle.c.

Could you split that up into two CVE ids? I ask because the 
realtext issue doesn't affect versions < 0.9.x which is the 
case for the version we have in Debian so I can not use a 
fixed version + not-affected for one CVE id in our security 

Kind regards
Nico Golde - - - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ