{"id":"MGASA-2015-0095","summary":"Updated vlc package fixes security vulnerability","details":"Updated vlc packages (2.1.6) are an upgrade with some fixes. Some of the\nproblems fixed upstream were already fixed by a previous Mageia update\nto VLC (see the link to MGASA-2015-0053).\n\nVLC versions before 2.1.5 contain a vulnerability in the transcode module\nthat may allow a corrupted stream to overflow buffers on the heap. With a\nnon-malicious input, this could lead to heap corruption and a crash.\nHowever, under the right circumstances, a malicious attacker could\npotentially use this vulnerability to hijack program execution, and on\nsome platforms, execute arbitrary code (CVE-2014-6440)\n","modified":"2026-04-16T06:26:03.144624322Z","published":"2015-03-05T22:05:29Z","upstream":["CVE-2014-6440"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2015-0095.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=15384"},{"type":"WEB","url":"http://openwall.com/lists/oss-security/2015/03/05/2"}],"affected":[{"package":{"name":"vlc","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/vlc?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.1.6-1.0.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0095.json"}},{"package":{"name":"vlc","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/vlc?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.1.6-1.0.mga4.tainted"}]}],"ecosystem_specific":{"section":"tainted"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0095.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}