Updated vlc packages fix security vulnerabilities
Publication date: 08 Jun 2021Modification date: 07 Jun 2021
Type: security
Affected Mageia releases : 7 , 8
Description
A remote user could create a specifically crafted file that could trigger some various issues. It is possible to trigger a remote code execution through a specifically crafted playlist, and tricking the user into interacting with that playlist elements. It is also possible to trigger read or write buffer overflows with some crafted files or by a MITM attack on the automatic updater If successful, a malicious third party could trigger either a crash of VLC or an arbitratry code execution with the privileges of the target user. We updated VLC to latest version available.
References
- https://bugs.mageia.org/show_bug.cgi?id=28930
- https://www.videolan.org/security/sb-vlc3013.html
- https://www.videolan.org/vlc/releases/3.0.13.html
- https://code.videolan.org/videolan/vlc-3.0/-/raw/master/NEWS
- https://git.videolan.org/?p=vlc/vlc-3.0.git;a=blob;f=NEWS;h=e5dd1855e797179ec3a0bee2cae4ac68705a70cc;hb=41878ff4f2a4b566cf0a1bd15f72037b2be98a18
SRPMS
7/core
- vlc-3.0.14-1.mga7
7/tainted
- vlc-3.0.14-1.mga7.tainted
8/tainted
- vlc-3.0.14-1.mga8.tainted
8/core
- vlc-3.0.14-1.mga8