{"id":"MGASA-2015-0053","summary":"Updated vlc packages fix security vulnerabilities","details":"Updated vlc packages fix security vulnerabilities:\n\nOn 32 bit builds, parsing of update status files with a size of 4294967295\nor more lead to an integer truncation caused by a cast to size_t in a call to\nmalloc and a subsequent buffer overflow. This happened prior to checking the\nfiles' signature (CVE-2014-9625).\n\nThe MP4 demuxer, when parsing string boxes, did not properly check the length\nof the box, leading to a possible integer underflow when using this length\nvalue in a call to memcpy(). This could allow remote attackers to cause a\ndenial of service (crash) or arbitrary code execution via crafted MP4 files\n(CVE-2014-9626).\n\nThe MP4 demuxer, when parsing string boxes, did not properly check that the\nconversion of the box length from 64bit integer to 32bit integer on 32bit\nplatforms did not cause a truncation, leading to a possible buffer overflow.\nThis could allow remote attackers to cause a denial of service (crash) or\narbitrary code execution via crafted MP4 files (CVE-2014-9627).\n\nThe MP4 demuxer, when parsing string boxes, did not properly check the length\nof the box, leading to a possible buffer overflow. This could allow remote\nattackers to cause a denial of service (crash) or arbitrary code execution\nvia crafted MP4 files (CVE-2014-9628).\n\nThe Dirac and Schroedinger encoders did not properly check for an integer\noverflow on 32bit platforms, leading to a possible buffer overflow. This\ncould allow remote attackers to cause a denial of service (crash) or\narbitrary code execution (CVE-2014-9629).\n\nWhen streaming ogg-files via rtp, an ogg-file can trigger an invalid memory\nwrite access using an overly long 'configuration' string, which causes an\nattempted stack allocation with an attacker-controlled size (CVE-2014-9630).\n","modified":"2026-04-16T06:26:10.654899444Z","published":"2015-02-05T22:26:07Z","upstream":["CVE-2014-9625","CVE-2014-9626","CVE-2014-9627","CVE-2014-9628","CVE-2014-9629","CVE-2014-9630"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2015-0053.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=15195"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2015-02/msg00015.html"},{"type":"WEB","url":"https://www.debian.org/security/2015/dsa-3150"},{"type":"WEB","url":"http://openwall.com/lists/oss-security/2015/01/20/11"}],"affected":[{"package":{"name":"vlc","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/vlc?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.1.5-1.1.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0053.json"}},{"package":{"name":"vlc","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/vlc?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.1.5-1.1.mga4.tainted"}]}],"ecosystem_specific":{"section":"tainted"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0053.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}