hi Sebastian, On Tue, Jul 23, 2019 at 09:24:29PM +0200, Sebastian Ramacher wrote: > Hi Salvatore > > On 2019-07-16 22:36:50, Salvatore Bonaccorso wrote: > > Source: vlc > > Version: 3.0.7.1-2 > > Severity: important > > Tags: security upstream > > Forwarded: https://trac.videolan.org/vlc/ticket/22474 > > Control: found -1 3.0.7.1-1 > > Control: found -1 3.0.7-1 > > Control: found -1 3.0.7-0+deb9u1 > > > > Hi, > > > > The following vulnerability was published for vlc, sorry another one. > > For buster, stretch I think we can follow the usual strategy and > > release a new upstream stable version once available. > > > > CVE-2019-13615[0]: > > | VideoLAN VLC media player 3.0.7.1 has a heap-based buffer over-read in > > | mkv::demux_sys_t::FreeUnused() in modules/demux/mkv/demux.cpp when > > | called from mkv::Open in modules/demux/mkv/mkv.cpp. > > > > > > If you fix the vulnerability please also make sure to include the > > CVE (Common Vulnerabilities & Exposures) id in your changelog entry. > > > > For further information see: > > > > [0] https://security-tracker.debian.org/tracker/CVE-2019-13615 > > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13615 > > [1] https://trac.videolan.org/vlc/ticket/22474 > > FWIW, this issue is disputed upstream. > > Cheers > > > > > Please adjust the affected versions in the BTS as needed.
Ack, let's see what will be the outcome. Thanks in any case for the heads-up on the disputed state upstream! Regards, Salvatore