Debian Security Advisory
DLA-2728-1 vlc -- LTS security update
- Date Reported:
- 03 Aug 2021
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2021-25801, CVE-2021-25802, CVE-2021-25803, CVE-2021-25804.
- More information:
It was discovered that there were a number of issues in VideoLAN (aka 'vlc', a popular video and multimedia player:
A buffer overflow vulnerability in the __Parse_indx component allowed attackers to cause an out-of-bounds read via a crafted .avi file.
A buffer overflow vulnerability in the AVI_ExtractSubtitle component could have allowed attackers to cause an out-of-bounds read via a crafted .avi file.
A buffer overflow vulnerability in the vlc_input_attachment_New component allowed attackers to cause an out-of-bounds read via a specially-crafted .avi file.
A NULL-pointer dereference in "Open" in avi.c can result in a denial of service (DoS) vulnerability.
For Debian 9
Stretch, these problems have been fixed in version 3.0.11-0+deb9u2.
We recommend that you upgrade your vlc packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS