From gitlab at videolan.org Tue May 5 20:04:30 2020 From: gitlab at videolan.org (Konstantin Pavlov) Date: Tue, 05 May 2020 20:04:30 +0200 Subject: [www-doc] [Git][VideoLAN.org/websites][master] nightlies: mention a new location for the new files Message-ID: <5eb1aaae6c25_2a63fc41835b2881507916@gitlab.mail> Konstantin Pavlov pushed to branch master at VideoLAN organization / websites Commits: e06487d8 by Konstantin Pavlov at 2020-05-05T21:04:17+03:00 nightlies: mention a new location for the new files - - - - - 6 changed files: - nightlies.videolan.org/build/iOS/HEADER.html - nightlies.videolan.org/build/macosx-intel/HEADER.html - nightlies.videolan.org/build/source/HEADER.html - nightlies.videolan.org/build/tvOS/HEADER.html - nightlies.videolan.org/build/win32/HEADER.html - nightlies.videolan.org/build/win64/HEADER.html Changes: ===================================== nightlies.videolan.org/build/iOS/HEADER.html ===================================== @@ -2,13 +2,16 @@ -

MobileVLCKit iOS nightly builds for ARMv7, ARMv7s, AArch64, x86_64 and i686

+

!!! MobileVLCKit iOS nightly builds were moved to a new location!!!

+

MobileVLCKit iOS nightly builds for ARMv7, ARMv7s, AArch64, x86_64 and i686

Remember to test the latest nightly build before reporting a bug (in one of the older nightly builds). Have fun!

Please report nightly builds breakage (meaning that there is no new build) on #videolan on irc.freenode.net.

-

Note: MobileVLCKit's nightly builds for iOS require iOS 7 or later as well as Xcode 7.3 or later

+

Note: MobileVLCKit's nightly builds for iOS require iOS 7 or later as well as Xcode 7.3 or later

The static framework will not work on earlier releases of iOS. Linking with libc++ instead of libstdc++ is required.

Looking for nightly builds for other OSes or official releases?

+

!!! MobileVLCKit iOS nightly builds were moved to a new location!!!

+ ===================================== nightlies.videolan.org/build/macosx-intel/HEADER.html ===================================== @@ -2,18 +2,22 @@ -

VLC media player nightly builds for macOS

+

!!! VLC media player 4.0 nightly builds for macOS were moved to a new location!!!

+

!!! VLC media player 3.0 nightly builds for macOS were moved to a new location!!!

+

VLC media player nightly builds for macOS

Remember to test the latest nightly build before reporting a bug (in one of the older nightly builds). Have fun!

Please report nightly builds breakage (meaning that there is no new build) on #videolan on irc.freenode.net.

-

Note: VLC's nightly builds require at least macOS 10.7 for VLC 3.0.x (stable version) or macOS 10.11 for VLC 4.0.0 (development version)

+

Note: VLC's nightly builds require at least macOS 10.7 for VLC 3.0.x (stable version) or macOS 10.11 for VLC 4.0.0 (development version)

It will not launch on older releases. We recommend you to keep your Mac OS X installation up-to-date and to install Apple's updates. This will also improve your VLC usage experience.

Note that nightly builds for macOS are not signed with our GateKeeper certificate. Therefore, you need to right-click on the application to select Open to launch them for the first time after download.

-

What's the stable branch?

+

What's the stable branch?

That's currently VLC's 3.0 series. We no longer provide nightly builds for older versions.

Looking for nightly builds for other OSes or official releases?

+

!!! VLC media player 4.0 nightly builds for macOS were moved to a new location!!!

+

!!! VLC media player 3.0 nightly builds for macOS were moved to a new location!!!

===================================== nightlies.videolan.org/build/source/HEADER.html ===================================== @@ -3,7 +3,7 @@

VLC media player daily code snapshots

-

Please report nightly snapshots breakage (meaning that there is no new snapshot) on #videolan on irc.freenode.net.

+

The service is now discontinued. Please use tarball export from vlc.git and vlc-3.0.git respectively.

Looking for nightly builds or official releases?

===================================== nightlies.videolan.org/build/tvOS/HEADER.html ===================================== @@ -2,10 +2,13 @@ -

TVVLCKit tvOS nightly builds for AArch64 and x86_64

+

!!! TVVLCKit tvOS nightly builds moved to a new location!!!

+ +

TVVLCKit tvOS nightly builds for AArch64 and x86_64

Remember to test the latest nightly build before reporting a bug (in one of the older nightly builds). Have fun!

Please report nightly builds breakage (meaning that there is no new build) on #videolan on irc.freenode.net.

-

Note: TVVLCKit's nightly builds require tvOS 9 or later as well as Xcode 7.3 or later

+

Note: TVVLCKit's nightly builds require tvOS 9 or later as well as Xcode 7.3 or later

Linking with libc++ instead of libstdc++ is required.

Looking for nightly builds for other OSes or official releases?

+

!!! TVVLCKit tvOS nightly builds moved to a new location!!!

===================================== nightlies.videolan.org/build/win32/HEADER.html ===================================== @@ -2,14 +2,20 @@ -

VLC media player Win32 nightly builds

+

!!! VLC media player 4.0 Win32 nightly builds moved to a new location!!!

+

!!! VLC media player 3.0 Win32 nightly builds moved to a new location!!!

+ +

VLC media player Win32 nightly builds

Remember to test the latest nightly build before reporting a bug (in one of the older nightly builds). Have fun!

Please report nightly builds breakage (meaning that there is no new build) on #videolan on irc.freenode.net.

-

What's the stable branch?

+

What's the stable branch?

Looking for nightly builds for other OSes or official releases?

+ +

!!! VLC media player 4.0 Win32 nightly builds moved to a new location!!!

+

!!! VLC media player 3.0 Win32 nightly builds moved to a new location!!!

===================================== nightlies.videolan.org/build/win64/HEADER.html ===================================== @@ -2,14 +2,20 @@ -

VLC media player Win64 nightly builds

+

!!! VLC media player 4.0 Win64 nightly builds moved to a new location!!!

+

!!! VLC media player 3.0 Win64 nightly builds moved to a new location!!!

+ +

VLC media player Win64 nightly builds

Remember to test the latest nightly build before reporting a bug (in one of the older nightly builds). Have fun!

Please report nightly builds breakage (meaning that there is no new build) on #videolan on irc.freenode.net.

-

What's the stable branch?

+

What's the stable branch?

Looking for nightly builds for other OSes or official releases?

+ +

!!! VLC media player 4.0 Win64 nightly builds moved to a new location!!!

+

!!! VLC media player 3.0 Win64 nightly builds moved to a new location!!!

View it on GitLab: https://code.videolan.org/VideoLAN.org/websites/-/commit/e06487d834005ec93dd5761093fb00ea6f24ed41 -- View it on GitLab: https://code.videolan.org/VideoLAN.org/websites/-/commit/e06487d834005ec93dd5761093fb00ea6f24ed41 You're receiving this email because of your account on code.videolan.org. From gitlab at videolan.org Thu May 7 17:07:16 2020 From: gitlab at videolan.org (Jean-Baptiste Kempf) Date: Thu, 07 May 2020 17:07:16 +0200 Subject: [www-doc] [Git][VideoLAN.org/websites][master] Security: update page layout Message-ID: <5eb42424fc89_9c3c3f8449c666ac41753f@gitlab.mail> Jean-Baptiste Kempf pushed to branch master at VideoLAN organization / websites Commits: 128b2ec5 by Jean-Baptiste Kempf at 2020-05-07T17:07:03+02:00 Security: update page layout - - - - - 1 changed file: - www.videolan.org/security/index.php Changes: ===================================== www.videolan.org/security/index.php ===================================== @@ -1,9 +1,13 @@ +
+
+

Security contacts

Email: security at REMOVE@videolan.org.

Please note that signed emails are welcome, and responsible disclosure is appreciated.

@@ -227,4 +231,8 @@ Real RTSP demuxer, Real Media demuxer, MP4 demuxer, Cinepak decoder.
- -

Security contacts

+

Security

+

Security contacts

Email: security at REMOVE@videolan.org.

-

Please note that signed emails are welcome, and responsible disclosure is appreciated.

- -

Past security advisories

- -

Please note: -The VideoLAN project does not issue security advisories -for underlying third party libraries. -Please refer to the concerned third parties as appropriate. -

- -

2020

-
- -
VideoLAN-SB-VLC-309
-
Multiple vulnerabilities fixed in VLC media player - Details -
- -

2019

-
- -
VideoLAN-SB-VLC-308
-
Multiple vulnerabilities fixed in VLC media player - Details -
- -
VideoLAN-SA-1901
-
Buffer overflow in avi demuxer & heap use after free in mkv demuxer - Details -
- -

2018

-
- -
VideoLAN-SA-1801
-
Heap use after free in avformat demuxer - Details -
- -

2016

-
- -
VideoLAN-SA-1601
-
Buffer Overflow in Processing QuickTime IMA Files - Details -
- -

2015

-
- -
VideoLAN-SA-1501
-
Multiple heap and buffer overflows - Details -
- - -

2013

-
- -
VideoLAN-SA-1302 (CVE-2013-1954)
-
Overflow in ASF Demuxer - Details -
- -
VideoLAN-SA-1301
-
Overflow in subtitles decoder - Details -
- - -

2012

-
- -
VideoLAN-SA-1203 (CVE-2012-5470)
-
Overflow in PNG decoder - Details -
- -
VideoLAN-SA-1202 (CVE-2012-1776)
-
Heap overflows in Real RTPS protocol - Details -
- -
VideoLAN-SA-1201 (CVE-2012-1775)
-
Stack overflow in MMS protocol - Details -
- - -

2011

-
-
VideoLAN-SA-1108 (CVE-2012-0023)
-
Heap corruption in TiVo demuxer. - Details -
- -
VideoLAN-SA-1107 (CVE-2011-3333)
-
NULL dereference in HTTP and RTSP server. - Details -
- -
VideoLAN-SA-1106 (CVE-2011-2588)
-
Heap buffer overflow in AVI demuxer. - Details -
- -
VideoLAN-SA-1105 (CVE-2011-2587)
-
Heap buffer overflow in RealMedia demuxer. - Details -
- -
VideoLAN-SA-1104 (CVE-2011-2194)
-
Integer overflow in XSPF demuxer. - Details -
- -
VideoLAN-SA-1103 (CVE-2011-1684)
-
Heap corruption in MP4 demuxer. - Details -
- -
VideoLAN-SA-1102 (CVE-2011-0531)
-
Insufficient input validation in MKV demuxer. - Details -
- -
VideoLAN-SA-1101 (CVE-2011-0021)
-
Heap corruption in CDG codec. - Details -
-
- -

2010

-
-
VideoLAN-SA-1007 (CVE-2010-3907)
-
Buffer overflow in Real Media demuxer. - Details -
- -
VideoLAN-SA-1006
-
Stack smashing in SMB/CIFS access. - Details -
- -
VideoLAN-SA-1005 (CVE-2010-3124)
-
DLL preloading vulnerability. - Details -
- -
VideoLAN-SA-1004 (CVE-2010-2937)
-
Insufficient input validation VLC TagLib plugin. - Details -
- -
VideoLAN-SA-1003 (CVE-2010-1441..5)
-
Multiple vulnerabilities in VLC. Details -
-
VideoLAN-SA-1002
-
Buffer overflow in ancient VLC media player Details -
-
VideoLAN-SA-1001
-
Clam AntiVirus input validation error Details -
-
-

2009

- -
-
VideoLAN-SA-0901
-
Stack overflows in VLC demuxers. Details -
-
-

2008

- -
-
VideoLAN-SA-0811 (CVE-2008-5276)
-
Buffer overflows in VLC Real demuxers. Details -
-
VideoLAN-SA-0810 (CVE-2008-5032, CVE-2008-5036)
-
Multiple overflows in VLC demuxers. Details -
-
VideoLAN-SA-0809 (CVE-2008-4654, CVE-2008-4686)
-
Buffer overflow in VLC TiVo demuxer. Details -
-
VideoLAN-SA-0807 (CVE-2008-3732, CVE-2008-3794)
-
Multiple overflows in VLC demuxers. Details -
-
VideoLAN-SA-0806 (CVE-2008-2430)
-
Arbitrary code execution through potential heap-overflows in VLC's WAV demuxer. Details -
-
VideoLAN-SA-0805 (CVE-2008-2147)
-
Arbitrary code execution through rogue VLC plugins in the current directory. Details -
-
VideoLAN-SA-0804 (CVE-2007-6683)
-
Arbitrary file overwrite and other abuses through M3U parser and browsers plugins. Details -
-
VideoLAN-SA-0803 (CVE-2008-0073, CVE-2008-1489, CVE-2008-1768, CVE-2008-1769)
-
Arbitrary memory overwrite vulnerabilities in multiple modules: -Real RTSP demuxer, Real Media demuxer, MP4 demuxer, Cinepak decoder. Details -
-
VideoLAN-SA-0802, CORE-2008-0130 (CVE-2008-0984)
-
Arbitrary memory overwrite vulnerability in the MP4 demuxer. Details -
-
VideoLAN-SA-0801 (CVE-2007-6681, CVE-2007-6682, CVE-2008-0295, CVE-2008-0296)
-
Format string vulnerability in the Web interface. Stack-based buffer overflow in the Subtitles demuxer. - String buffer overflows in the Real RTSP demuxer. Details
-
- -

2007

- -
-
VideoLAN-SA-0703, CORE-2007-1004 (CVE-2007-6262)
-
Recursive plugin release vulnerability in the Active X plugin. Details -
-
VideoLAN-SA-0702 (CVE-2007-3316)
-
Format string injection in Vorbis, Theora, SAP and CDDA plugins. Details -
-
VideoLAN-SA-0701, MOAB-02-01-2007 (CVE-2007-0017)
-
URL format string injection in CDDA and VCDX plugins. Details -
-
- +

Please note that signed emails are welcome, and responsible disclosure is very much appreciated.

+ +
+
+

VLC release Security Bulletins (SB)

+

Those bulletins are related to each VLC release and can be made of multiple security issues, internal and external.

+

2020

+
+
VideoLAN-SB-VLC-309
+
Multiple vulnerabilities fixed in VLC media player 3.0.9/3.0.10 + Details +
+ +

2019

+
+ +
VideoLAN-SB-VLC-308
+
Multiple vulnerabilities fixed in VLC media player 3.0.8 + Details +
+
+ +
+ +

VideoAN security advisories

+ +

Please note: + The VideoLAN project does not issue security advisories + for underlying third party libraries. + Please refer to the concerned third parties as appropriate. +

+

2019

+
+ +
VideoLAN-SA-1901
+
Buffer overflow in avi demuxer & heap use after free in mkv demuxer + Details +
+ +

2018

+
+ +
VideoLAN-SA-1801
+
Heap use after free in avformat demuxer + Details +
+ +

2016

+
+ +
VideoLAN-SA-1601
+
Buffer Overflow in Processing QuickTime IMA Files + Details +
+ +

2015

+
+ +
VideoLAN-SA-1501
+
Multiple heap and buffer overflows + Details +
+ + +

2013

+
+ +
VideoLAN-SA-1302 (CVE-2013-1954)
+
Overflow in ASF Demuxer + Details +
+ +
VideoLAN-SA-1301
+
Overflow in subtitles decoder + Details +
+ + +

2012

+
+ +
VideoLAN-SA-1203 (CVE-2012-5470)
+
Overflow in PNG decoder + Details +
+ +
VideoLAN-SA-1202 (CVE-2012-1776)
+
Heap overflows in Real RTPS protocol + Details +
+ +
VideoLAN-SA-1201 (CVE-2012-1775)
+
Stack overflow in MMS protocol + Details +
+ + +

2011

+
+
VideoLAN-SA-1108 (CVE-2012-0023)
+
Heap corruption in TiVo demuxer. + Details +
+ +
VideoLAN-SA-1107 (CVE-2011-3333)
+
NULL dereference in HTTP and RTSP server. + Details +
+ +
VideoLAN-SA-1106 (CVE-2011-2588)
+
Heap buffer overflow in AVI demuxer. + Details +
+ +
VideoLAN-SA-1105 (CVE-2011-2587)
+
Heap buffer overflow in RealMedia demuxer. + Details +
+ +
VideoLAN-SA-1104 (CVE-2011-2194)
+
Integer overflow in XSPF demuxer. + Details +
+ +
VideoLAN-SA-1103 (CVE-2011-1684)
+
Heap corruption in MP4 demuxer. + Details +
+ +
VideoLAN-SA-1102 (CVE-2011-0531)
+
Insufficient input validation in MKV demuxer. + Details +
+ +
VideoLAN-SA-1101 (CVE-2011-0021)
+
Heap corruption in CDG codec. + Details +
+
+ +

2010

+
+
VideoLAN-SA-1007 (CVE-2010-3907)
+
Buffer overflow in Real Media demuxer. + Details +
+ +
VideoLAN-SA-1006
+
Stack smashing in SMB/CIFS access. + Details +
+ +
VideoLAN-SA-1005 (CVE-2010-3124)
+
DLL preloading vulnerability. + Details +
+ +
VideoLAN-SA-1004 (CVE-2010-2937)
+
Insufficient input validation VLC TagLib plugin. + Details +
+ +
VideoLAN-SA-1003 (CVE-2010-1441..5)
+
Multiple vulnerabilities in VLC. Details +
+
VideoLAN-SA-1002
+
Buffer overflow in ancient VLC media player Details +
+
VideoLAN-SA-1001
+
Clam AntiVirus input validation error Details +
+
+

2009

+ +
+
VideoLAN-SA-0901
+
Stack overflows in VLC demuxers. Details +
+
+

2008

+ +
+
VideoLAN-SA-0811 (CVE-2008-5276)
+
Buffer overflows in VLC Real demuxers. Details +
+
VideoLAN-SA-0810 (CVE-2008-5032, CVE-2008-5036)
+
Multiple overflows in VLC demuxers. Details +
+
VideoLAN-SA-0809 (CVE-2008-4654, CVE-2008-4686)
+
Buffer overflow in VLC TiVo demuxer. Details +
+
VideoLAN-SA-0807 (CVE-2008-3732, CVE-2008-3794)
+
Multiple overflows in VLC demuxers. Details +
+
VideoLAN-SA-0806 (CVE-2008-2430)
+
Arbitrary code execution through potential heap-overflows in VLC's WAV demuxer. Details +
+
VideoLAN-SA-0805 (CVE-2008-2147)
+
Arbitrary code execution through rogue VLC plugins in the current directory. Details +
+
VideoLAN-SA-0804 (CVE-2007-6683)
+
Arbitrary file overwrite and other abuses through M3U parser and browsers plugins. Details +
+
VideoLAN-SA-0803 (CVE-2008-0073, CVE-2008-1489, CVE-2008-1768, CVE-2008-1769)
+
Arbitrary memory overwrite vulnerabilities in multiple modules: + Real RTSP demuxer, Real Media demuxer, MP4 demuxer, Cinepak decoder. Details +
+
VideoLAN-SA-0802, CORE-2008-0130 (CVE-2008-0984)
+
Arbitrary memory overwrite vulnerability in the MP4 demuxer. Details +
+
VideoLAN-SA-0801 (CVE-2007-6681, CVE-2007-6682, CVE-2008-0295, CVE-2008-0296)
+
Format string vulnerability in the Web interface. Stack-based buffer overflow in the Subtitles demuxer. + String buffer overflows in the Real RTSP demuxer. Details
+
+ +

2007

+ +
+
VideoLAN-SA-0703, CORE-2007-1004 (CVE-2007-6262)
+
Recursive plugin release vulnerability in the Active X plugin. Details +
+
VideoLAN-SA-0702 (CVE-2007-3316)
+
Format string injection in Vorbis, Theora, SAP and CDDA plugins. Details +
+
VideoLAN-SA-0701, MOAB-02-01-2007 (CVE-2007-0017)
+
URL format string injection in CDDA and VCDX plugins. Details +
+
+ +
View it on GitLab: https://code.videolan.org/VideoLAN.org/websites/-/commit/442052bc704118b2aa51e3c1f9d05afef171639c -- View it on GitLab: https://code.videolan.org/VideoLAN.org/websites/-/commit/442052bc704118b2aa51e3c1f9d05afef171639c You're receiving this email because of your account on code.videolan.org. From gitlab at videolan.org Thu May 7 17:24:19 2020 From: gitlab at videolan.org (Jean-Baptiste Kempf) Date: Thu, 07 May 2020 17:24:19 +0200 Subject: [www-doc] [Git][VideoLAN.org/websites][master] Update security page Message-ID: <5eb42823e23f0_9c3c3f84614d9598417980@gitlab.mail> Jean-Baptiste Kempf pushed to branch master at VideoLAN organization / websites Commits: 7dfffc11 by Jean-Baptiste Kempf at 2020-05-07T17:24:11+02:00 Update security page - - - - - 1 changed file: - www.videolan.org/security/index.php Changes: ===================================== www.videolan.org/security/index.php ===================================== @@ -7,15 +7,17 @@
-

Security

-

Security contacts

-

Email: security at REMOVE@videolan.org.

-

Please note that signed emails are welcome, and responsible disclosure is very much appreciated.

+

Security

+
+

Security contacts

+

Email: security at REMOVE@videolan.org.

+

Please note that signed emails are welcome, and responsible disclosure is very much appreciated.

+
-

VLC release Security Bulletins (SB)

+

VLC releases Security Bulletins (SB)

Those bulletins are related to each VLC release and can be made of multiple security issues, internal and external.

2020

View it on GitLab: https://code.videolan.org/VideoLAN.org/websites/-/commit/7dfffc11c2558a7c29be95e0fa2cd160106d4ab8 -- View it on GitLab: https://code.videolan.org/VideoLAN.org/websites/-/commit/7dfffc11c2558a7c29be95e0fa2cd160106d4ab8 You're receiving this email because of your account on code.videolan.org. From gitlab at videolan.org Thu May 7 18:31:05 2020 From: gitlab at videolan.org (Jean-Baptiste Kempf) Date: Thu, 07 May 2020 18:31:05 +0200 Subject: [www-doc] [Git][VideoLAN.org/websites][master] SB 3.0.9 iOS and Android Message-ID: <5eb437c9535a4_9c3c3f8449e66c0442222f@gitlab.mail> Jean-Baptiste Kempf pushed to branch master at VideoLAN organization / websites Commits: 8955a3a9 by Jean-Baptiste Kempf at 2020-05-07T18:30:53+02:00 SB 3.0.9 iOS and Android - - - - - 1 changed file: - www.videolan.org/security/sb-vlc309.php Changes: ===================================== www.videolan.org/security/sb-vlc309.php ===================================== @@ -41,8 +41,11 @@ until the patch is applied.

Until VLC gets updated to the 3.0.9 version, it is advised not to use the network discovery, including for chromecast

+

VLC-iOS

+

VLC on iOS suffered from an access to restricted folders (passcode feature) under the web interface without entering the passcode.

+

Solution

-

VLC media player 3.0.9 addresses the issues. +

VLC media player 3.0.9 addresses the issues. The Android versions 3.2.12 and iOS 3.2.7 are addressing those issues too.

Credits

@@ -60,6 +63,9 @@ until the patch is applied.
VLC official GIT repository
http://git.videolan.org/?p=vlc.git
+
VLC-iOS official GIT repository
+
https://code.videolan.org/videolan/vlc-ios +
View it on GitLab: https://code.videolan.org/VideoLAN.org/websites/-/commit/8955a3a97fc8031b124b7d54addcd106306db081 -- View it on GitLab: https://code.videolan.org/VideoLAN.org/websites/-/commit/8955a3a97fc8031b124b7d54addcd106306db081 You're receiving this email because of your account on code.videolan.org. From gitlab at videolan.org Thu May 7 18:33:51 2020 From: gitlab at videolan.org (Jean-Baptiste Kempf) Date: Thu, 07 May 2020 18:33:51 +0200 Subject: [www-doc] [Git][VideoLAN.org/websites][master] Fix typo Message-ID: <5eb4386f13c8a_9c3c3f8458ff19ac422450@gitlab.mail> Jean-Baptiste Kempf pushed to branch master at VideoLAN organization / websites Commits: 5d3421ef by Jean-Baptiste Kempf at 2020-05-07T18:33:37+02:00 Fix typo - - - - - 1 changed file: - www.videolan.org/security/index.php Changes: ===================================== www.videolan.org/security/index.php ===================================== @@ -37,7 +37,7 @@
-

VideoAN security advisories

+

VideoLAN security advisories

Please note: The VideoLAN project does not issue security advisories View it on GitLab: https://code.videolan.org/VideoLAN.org/websites/-/commit/5d3421ef8aea3bbbc7ec63120e0d3610fc9530b2 -- View it on GitLab: https://code.videolan.org/VideoLAN.org/websites/-/commit/5d3421ef8aea3bbbc7ec63120e0d3610fc9530b2 You're receiving this email because of your account on code.videolan.org. From gitlab at videolan.org Sat May 9 11:17:54 2020 From: gitlab at videolan.org (Jean-Baptiste Kempf) Date: Sat, 09 May 2020 11:17:54 +0200 Subject: [www-doc] [Git][VideoLAN.org/websites][master] SB-309 add ios credit Message-ID: <5eb6754237f91_9c3c3f84498191d0472475@gitlab.mail> Jean-Baptiste Kempf pushed to branch master at VideoLAN organization / websites Commits: 6d8a3745 by Jean-Baptiste Kempf at 2020-05-09T11:17:35+02:00 SB-309 add ios credit - - - - - 1 changed file: - www.videolan.org/security/sb-vlc309.php Changes: ===================================== www.videolan.org/security/sb-vlc309.php ===================================== @@ -49,8 +49,9 @@ until the patch is applied.

Credits

-

CVE-2019-19721 was reported by Antonio Morales from the Semmle Security Team

-

CVE-2020-6071 CVE-2020-6072 CVE-2020-6073 CVE-2020-6077 CVE-2020-6078 CVE-2020-6079 were discovered & reported by Claudio Bozzato from Cisco Talos

+

CVE-2019-19721 was reported by Antonio Morales from the Semmle Security Team.

+

CVE-2020-6071 CVE-2020-6072 CVE-2020-6073 CVE-2020-6077 CVE-2020-6078 CVE-2020-6079 were discovered & reported by Claudio Bozzato from Cisco Talos.

+

VLC iOS web interface issue was reported by Dhiraj Mishra.

Special thanks

VideoLAN would like to thank Antonio Morales and Claudio Bozzato for their time and cooperation with the VideoLAN security team

View it on GitLab: https://code.videolan.org/VideoLAN.org/websites/-/commit/6d8a3745a3e47663c85faca7c8dfe9991e53b685 -- View it on GitLab: https://code.videolan.org/VideoLAN.org/websites/-/commit/6d8a3745a3e47663c85faca7c8dfe9991e53b685 You're receiving this email because of your account on code.videolan.org. From gitlab at videolan.org Thu May 21 00:10:26 2020 From: gitlab at videolan.org (Konstantin Pavlov) Date: Thu, 21 May 2020 00:10:26 +0200 Subject: [www-doc] [Git][VideoLAN.org/websites][master] vlc-stats.ref file with new i18n data Message-ID: <5ec5aad2ab540_85213f9e9c90d8806303b@gitlab.mail> Konstantin Pavlov pushed to branch master at VideoLAN organization / websites Commits: f4503387 by MichaƂ Trzebiatowski at 2020-05-20T23:36:27+02:00 vlc-stats.ref file with new i18n data - - - - - 1 changed file: - www.videolan.org/developers/i18n/vlc-stats.ref Changes: ===================================== www.videolan.org/developers/i18n/vlc-stats.ref ===================================== @@ -37,7 +37,7 @@ ga.po 2727 3 3490 gd.po 2472 1 3747 gl.po 6127 4 89 gu.po 5509 4 707 -he.po 3927 3 2290 +he.po 4024 0 2196 hi.po 1095 2 5123 hr.po 5044 2 1174 hu.po 6220 0 0 @@ -63,7 +63,7 @@ ml.po 6220 0 0 mn.po 1331 2 4887 mr.po 5524 4 692 ms.po 6220 0 0 -nb.po 5842 4 374 +nb.po 5854 0 366 ne.po 2625 3 3592 nl.po 6220 0 0 nn.po 3552 2 2666 @@ -72,7 +72,7 @@ pa.po 3432 4 2784 pl.po 6220 0 0 ps.po 714 2 5504 pt_BR.po 6220 0 0 -pt_PT.po 6213 4 3 +pt_PT.po 6220 0 0 ro.po 4480 2 1738 ru.po 6220 0 0 sc.po 802 0 5414 View it on GitLab: https://code.videolan.org/VideoLAN.org/websites/-/commit/f45033870f1758e5d1f6dd6344a10339f3ddd0fe -- View it on GitLab: https://code.videolan.org/VideoLAN.org/websites/-/commit/f45033870f1758e5d1f6dd6344a10339f3ddd0fe You're receiving this email because of your account on code.videolan.org. From gitlab at videolan.org Thu May 21 00:15:21 2020 From: gitlab at videolan.org (Konstantin Pavlov) Date: Thu, 21 May 2020 00:15:21 +0200 Subject: [www-doc] [Git][VideoLAN.org/websites][master] Rebuild vlcstat.html when vlc-stats.ref changes Message-ID: <5ec5abf9477f5_85213f9e9c90c64c64487@gitlab.mail> Konstantin Pavlov pushed to branch master at VideoLAN organization / websites Commits: d92421c2 by Konstantin Pavlov at 2020-05-21T01:14:49+03:00 Rebuild vlcstat.html when vlc-stats.ref changes - - - - - 1 changed file: - www.videolan.org/developers/i18n/Makefile.inc Changes: ===================================== www.videolan.org/developers/i18n/Makefile.inc ===================================== @@ -1,2 +1,3 @@ # Additionnal dependencies index.html: languages +vlcstat.html: vlc-stats.ref View it on GitLab: https://code.videolan.org/VideoLAN.org/websites/-/commit/d92421c279930e1b5f8fd24d21f00aba6e739036 -- View it on GitLab: https://code.videolan.org/VideoLAN.org/websites/-/commit/d92421c279930e1b5f8fd24d21f00aba6e739036 You're receiving this email because of your account on code.videolan.org.