Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 20 Jan 2015 22:03:29 +0100
From: Fabian Yamaguchi <fabian.yamaguchi@...uni-goettingen.de>
To: <cve-assign@...re.org>
CC: <oss-security@...ts.openwall.com>
Subject: Re: Vulnerabilities in VLC 2.1.5

Thank you!

On 01/20/2015 09:58 PM, cve-assign@...re.org wrote:
>> * Buffer overflow in updater:
> 
>> https://github.com/videolan/vlc/commit/fbe2837bc80f155c001781041a54c58b5524fc14
> 
> Use CVE-2014-9625 for this integer truncation caused by a cast to
> size_t (with resultant buffer overflow).
> 
> 
...


Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.