Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.853122
Categoría:SuSE Local Security Checks
Título:openSUSE: Security Advisory for vlc (openSUSE-SU-2020:0545-1)
Resumen:The remote host is missing an update for the 'vlc'; package(s) announced via the openSUSE-SU-2020:0545-1 advisory.
Descripción:Summary:
The remote host is missing an update for the 'vlc'
package(s) announced via the openSUSE-SU-2020:0545-1 advisory.

Vulnerability Insight:
This update for vlc fixes the following issues:

vlc was updated to version 3.0.9.2:

+ Misc: Properly bump the version in configure.ac.

Changes from version 3.0.9.1:

+ Misc: Fix VLSub returning 401 for search request.

Changes from version 3.0.9:

+ Core: Work around busy looping when playing an invalid item through VLM.
+ Access:

* Multiple dvdread and dvdnav crashes fixes

* Fixed DVD glitches on clip change

* Fixed dvdread commands/data sequence inversion in some cases causing
unwanted glitches

* Better handling of authored as corrupted DVD

* Added libsmb2 support for SMB2/3 shares
+ Demux:

* Fix TTML entities not passed to decoder

* Fixed some WebVTT styling tags being not applied

* Misc raw H264/HEVC frame rate fixes

* Fix adaptive regression on TS format change (mostly HLS)

* Fixed MP4 regression with twos/sowt PCM audio

* Fixed some MP4 raw quicktime and ms-PCM audio

* Fixed MP4 interlacing handling

* Multiple adaptive stack (DASH/HLS/Smooth) fixes

* Enabled Live seeking for HLS

* Fixed seeking in some cases for HLS

* Improved Live playback for Smooth and DASH

* Fixed adaptive unwanted end of stream in some cases

* Faster adaptive start and new buffering control options
+ Packetizers:

* Fixes H264/HEVC incomplete draining in some cases

* packetizer_helper: Fix potential trailing junk on last packet

* Added missing drain in packetizers that was causing missing last frame
or audio

* Improved check to prevent fLAC synchronization drops
+ Decoder:

* avcodec: revector video decoder to fix incomplete drain

* spudec: implemented palette updates, fixing missing subtitles
on some DVD

* Fixed WebVTT CSS styling not being applied on Windows/macOS

* Fixed Hebrew teletext pages support in zvbi

* Fixed Dav1d aborting decoding on corrupted picture

* Extract and display of all CEA708 subtitles

* Update libfaad to 2.9.1

* Add DXVA support for VP9 Profile 2 (10 bits)

* Mediacodec aspect ratio with Amazon devices
+ Audio output:

* Added support for iOS audiounit audio above 48KHz

* Added support for amem audio up to 384KHz
+ Video output:

* Fix for opengl glitches in some drivers

* Fix GMA950 opengl support on macOS

* YUV to RGB StretchRect fixes with NVIDIA drivers

* Use libpacebo new tone mapping desaturation algorithm
+ Text renderer:

* Fix crashes on macOS with SSA/ASS subtitles containing emoji

* Fixed unwanted growing background in Freetype rendering and Y padding
+ Mux: Fixed some YUV mappings
+ Service Discovery: Update libmicrodns to 0.1.2.
+ Misc:

* Update YouTube, SoundCloud ...

Description truncated. Please see the references for more information.

Affected Software/OS:
'vlc' package(s) on openSUSE Leap 15.1.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2019-13602
Common Vulnerability Exposure (CVE) ID: CVE-2019-13962
Common Vulnerability Exposure (CVE) ID: CVE-2019-14437
Common Vulnerability Exposure (CVE) ID: CVE-2019-14438
Common Vulnerability Exposure (CVE) ID: CVE-2019-14498
Common Vulnerability Exposure (CVE) ID: CVE-2019-14533
Common Vulnerability Exposure (CVE) ID: CVE-2019-14534
Common Vulnerability Exposure (CVE) ID: CVE-2019-14535
Common Vulnerability Exposure (CVE) ID: CVE-2019-14776
Common Vulnerability Exposure (CVE) ID: CVE-2019-14777
Common Vulnerability Exposure (CVE) ID: CVE-2019-14778
Common Vulnerability Exposure (CVE) ID: CVE-2019-14970
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.