-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ----------------------------------------------------------------------- Debian LTS Advisory DLA-3216-1 [email protected] https://www.debian.org/lts/security/ Utkarsh Gupta December 03, 2022 https://wiki.debian.org/LTS - -----------------------------------------------------------------------
Package : vlc Version : 3.0.17.4-0+deb10u2 CVE ID : CVE-2022-41325 Mitsurugi Heishiro found out that in VLC, multimedia player and streamer, a potential buffer overflow in the vnc module could trigger remote code execution if a malicious vnc URL is deliberately played. For Debian 10 buster, this problem has been fixed in version 3.0.17.4-0+deb10u2. We recommend that you upgrade your vlc packages. For the detailed security status of vlc please refer to its security tracker page at: https://security-tracker.debian.org/tracker/vlc Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEbJ0QSEqa5Mw4X3xxgj6WdgbDS5YFAmOKhf4ACgkQgj6WdgbD S5avzBAAirbsIp5KCzvqEBaQu0ga9voAoI8rLxegb8i/SgdCsd5q9YGRcWGSn9bo DzmLcJrgaZhb0TmxzcYqUEopQdIogLXccmjDXpu3PY+MhUleK6FJN8k9mroKayGH ZI0Ls26Rt0VDqNhNMT7DQmgoWQaKkTfATOKklqgkta7akwkj8elNB9MFOEFtAOA9 6TCLqLyvUQAFz+BosMydjnu8pCTlIaPwVt9lJt6BbBBbNkhP5GQDFgwWXyItXJ9/ Lque/SGgt6ZhvH4Nyteh4mGn1h2ttFiYciKwLLIhKbYV9XOdzD7b8hxfL+zsSnee MaXbrcLIo+b6MrBCkiicgMAkSUHrSdYN+scqL2o49VbeB8gBVUhGyog0IheRm1o3 0ulWrA0t5rVjhoprReWaCWVKMTCqq1XBric5MefLDwB4YbgY7cZCWkI6QgHBZuHU jBMQf5qTqAC16EaPYOJ7lmK2K9x5MTNkFKqOr/KC3wNfuaDaXiIQpwDJZghvBJ/m oEojgQ3SSiW8YRyPI+W6h/km0NwfTuCetI8oTIJUrPmUKwY00Vel1btyM0Dlscb/ hCF2Ipu6zLooAk/wFe0YpOEHsJ0QrpSWHabTuf0hsU9P2VjE+B6hz7p6SP4eLNxf Fen1V6KilrjUUSCMFcwShGEwTA+OJYff3Izk2UXfkH4MBG4ckjQ= =bpWU -----END PGP SIGNATURE-----
