[www-doc] [Git][VideoLAN.org/websites][master] Security: refactor the page layout

Jean-Baptiste Kempf gitlab at videolan.org
Thu May 7 17:18:32 CEST 2020



Jean-Baptiste Kempf pushed to branch master at VideoLAN organization / websites


Commits:
442052bc by Jean-Baptiste Kempf at 2020-05-07T17:18:20+02:00
Security: refactor the page layout

- - - - -


1 changed file:

- www.videolan.org/security/index.php


Changes:

=====================================
www.videolan.org/security/index.php
=====================================
@@ -7,231 +7,240 @@
 
 <div class="container">
 <div class="row">
-
-<h1>Security contacts</h1>
+<h1 class="bigtitle">Security</h1>
+<h2>Security contacts</h2>
 <p><strong>Email</strong>: security at REMOVE@videolan.org.</p>
-<p>Please note that signed emails are welcome, and responsible disclosure is appreciated.</p>
-
-<h1>Past security advisories</h1>
-
-<p><strong>Please note</strong>:
-The VideoLAN project does not issue security advisories
-for underlying third party libraries.
-Please refer to the concerned third parties as appropriate.
-</p>
-
-<h2>2020</h2>
-<dl>
-
-<dt>VideoLAN-SB-VLC-309</dt>
-<dd>Multiple vulnerabilities fixed in VLC media player
- <a href="sb-vlc309.html">Details</a>
-</dd>
-
-<h2>2019</h2>
-<dl>
-
-<dt>VideoLAN-SB-VLC-308</dt>
-<dd>Multiple vulnerabilities fixed in VLC media player
- <a href="sb-vlc308.html">Details</a>
-</dd>
-
-<dt>VideoLAN-SA-1901</dt>
-<dd>Buffer overflow in avi demuxer & heap use after free in mkv demuxer
- <a href="sa1901.html">Details</a>
-</dd>
-
-<h2>2018</h2>
-<dl>
-
-<dt>VideoLAN-SA-1801</dt>
-<dd>Heap use after free in avformat demuxer
- <a href="sa1801.html">Details</a>
-</dd>
-
-<h2>2016</h2>
-<dl>
-
-<dt>VideoLAN-SA-1601</dt>
-<dd>Buffer Overflow in Processing QuickTime IMA Files
- <a href="sa1601.html">Details</a>
-</dd>
-
-<h2>2015</h2>
-<dl>
-
-<dt>VideoLAN-SA-1501</dt>
-<dd>Multiple heap and buffer overflows
- <a href="sa1501.html">Details</a>
-</dd>
-
-
-<h2>2013</h2>
-<dl>
-
-<dt>VideoLAN-SA-1302 (CVE-2013-1954)</dt>
-<dd>Overflow in ASF Demuxer
- <a href="sa1302.html">Details</a>
-</dd>
-
-<dt>VideoLAN-SA-1301</dt>
-<dd>Overflow in subtitles decoder
- <a href="sa1301.html">Details</a>
-</dd>
-
-
-<h2>2012</h2>
-<dl>
-
-<dt>VideoLAN-SA-1203 (CVE-2012-5470)</dt>
-<dd>Overflow in PNG decoder
- <a href="sa1203.html">Details</a>
-</dd>
-
-<dt>VideoLAN-SA-1202 (CVE-2012-1776)</dt>
-<dd>Heap overflows in Real RTPS protocol
- <a href="sa1202.html">Details</a>
-</dd>
-
-<dt>VideoLAN-SA-1201 (CVE-2012-1775)</dt>
-<dd>Stack overflow in MMS protocol
- <a href="sa1201.html">Details</a>
-</dd>
-
-
-<h2>2011</h2>
-<dl>
-<dt>VideoLAN-SA-1108 (CVE-2012-0023)</dt>
-<dd>Heap corruption in TiVo demuxer.
- <a href="sa1108.html">Details</a>
-</dd>
-
-<dt>VideoLAN-SA-1107 (CVE-2011-3333)</dt>
-<dd>NULL dereference in HTTP and RTSP server.
- <a href="sa1107.html">Details</a>
-</dd>
-
-<dt>VideoLAN-SA-1106 (CVE-2011-2588)</dt>
-<dd>Heap buffer overflow in AVI demuxer.
- <a href="sa1106.html">Details</a>
-</dd>
-
-<dt>VideoLAN-SA-1105 (CVE-2011-2587)</dt>
-<dd>Heap buffer overflow in RealMedia demuxer.
- <a href="sa1105.html">Details</a>
-</dd>
-
-<dt>VideoLAN-SA-1104 (CVE-2011-2194)</dt>
-<dd>Integer overflow in XSPF demuxer.
- <a href="sa1104.html">Details</a>
-</dd>
-
-<dt>VideoLAN-SA-1103 (CVE-2011-1684)</dt>
-<dd>Heap corruption in MP4 demuxer.
- <a href="sa1103.html">Details</a>
-</dd>
-
-<dt>VideoLAN-SA-1102 (CVE-2011-0531)</dt>
-<dd>Insufficient input validation in MKV demuxer.
- <a href="sa1102.html">Details</a>
-</dd>
-
-<dt>VideoLAN-SA-1101 (CVE-2011-0021)</dt>
-<dd>Heap corruption in CDG codec.
- <a href="sa1101.html">Details</a>
-</dd>
-</dl>
-
-<h2>2010</h2>
-<dl>
-<dt>VideoLAN-SA-1007 (CVE-2010-3907)</dt>
-<dd>Buffer overflow in Real Media demuxer.
- <a href="sa1007.html">Details</a>
-</dd>
-
-<dt>VideoLAN-SA-1006</dt>
-<dd>Stack smashing in SMB/CIFS access.
- <a href="sa1006.html">Details</a>
-</dd>
-
-<dt>VideoLAN-SA-1005 (CVE-2010-3124)</dt>
-<dd>DLL preloading vulnerability.
- <a href="sa1005.html">Details</a>
-</dd>
-
-<dt>VideoLAN-SA-1004 (CVE-2010-2937)</dt>
-<dd>Insufficient input validation VLC TagLib plugin.
- <a href="sa1004.html">Details</a>
-</dd>
-
-<dt>VideoLAN-SA-1003 (CVE-2010-1441..5)</dt>
-<dd>Multiple vulnerabilities in VLC. <a href="sa1003.html">Details</a>
-</dd>
-<dt>VideoLAN-SA-1002</dt>
-<dd>Buffer overflow in ancient VLC media player <a href="sa1002.html">Details</a>
-</dd>
-<dt>VideoLAN-SA-1001</dt>
-<dd>Clam AntiVirus input validation error <a href="sa1001.html">Details</a>
-</dd>
-</dl>
-<h2>2009</h2>
-
-<dl>
-<dt>VideoLAN-SA-0901</dt>
-<dd>Stack overflows in VLC demuxers. <a href="sa0901.html">Details</a>
-</dd>
-</dl>
-<h2>2008</h2>
-
-<dl>
-<dt>VideoLAN-SA-0811 (CVE-2008-5276)</dt>
-<dd>Buffer overflows in VLC Real demuxers. <a href="sa0811.html">Details</a>
-</dd>
-<dt>VideoLAN-SA-0810 (CVE-2008-5032, CVE-2008-5036)</dt>
-<dd>Multiple overflows in VLC demuxers. <a href="sa0810.html">Details</a>
-</dd>
-<dt>VideoLAN-SA-0809 (CVE-2008-4654, CVE-2008-4686)</dt>
-<dd>Buffer overflow in VLC TiVo demuxer. <a href="sa0809.html">Details</a>
-</dd>
-<dt>VideoLAN-SA-0807 (CVE-2008-3732, CVE-2008-3794)</dt>
-<dd>Multiple overflows in VLC demuxers. <a href="sa0807.html">Details</a>
-</dd>
-<dt>VideoLAN-SA-0806 (CVE-2008-2430)</dt>
-<dd>Arbitrary code execution through potential heap-overflows in VLC's WAV demuxer. <a href="sa0806.html">Details</a>
-</dd>
-<dt>VideoLAN-SA-0805 (CVE-2008-2147)</dt>
-<dd>Arbitrary code execution through rogue VLC plugins in the current directory. <a href="sa0805.html">Details</a>
-</dd>
-<dt>VideoLAN-SA-0804 (CVE-2007-6683)</dt>
-<dd>Arbitrary file overwrite and other abuses through M3U parser and browsers plugins. <a href="sa0804.html">Details</a>
-</dd>
-<dt>VideoLAN-SA-0803 (CVE-2008-0073, CVE-2008-1489, CVE-2008-1768, CVE-2008-1769)</dt>
-<dd>Arbitrary memory overwrite vulnerabilities in multiple modules:
-Real RTSP demuxer, Real Media demuxer, MP4 demuxer, Cinepak decoder. <a href="sa0803.html">Details</a>
-</dd>
-<dt>VideoLAN-SA-0802, CORE-2008-0130 (CVE-2008-0984)</dt>
-<dd>Arbitrary memory overwrite vulnerability in the MP4 demuxer. <a href="sa0802.html">Details</a>
-</dd>
-<dt>VideoLAN-SA-0801 (CVE-2007-6681, CVE-2007-6682, CVE-2008-0295, CVE-2008-0296)</dt>
-<dd>Format string vulnerability in the Web interface. Stack-based buffer overflow in the Subtitles demuxer.
-	String buffer overflows in the Real RTSP demuxer. <a href="sa0801.html">Details</a></dd>
-</dl>
-
-<h2>2007</h2>
-
-<dl>
-<dt>VideoLAN-SA-0703, CORE-2007-1004 (CVE-2007-6262)</dt>
-<dd>Recursive plugin release vulnerability in the Active X plugin. <a href="sa0703.html">Details</a>
-</dd>
-<dt>VideoLAN-SA-0702 (CVE-2007-3316)</dt>
-<dd>Format string injection in Vorbis, Theora, SAP and CDDA plugins. <a href="sa0702.html">Details</a>
-</dd>
-<dt>VideoLAN-SA-0701, MOAB-02-01-2007 (CVE-2007-0017)</dt>
-<dd>URL format string injection in CDDA and VCDX plugins. <a href="sa0701.html">Details</a>
-</dd>
-</dl>
-
+<p>Please note that signed emails are welcome, and responsible disclosure is very much appreciated.</p>
 </div>
+
+<div class="row">
+    <div class="col-md-6">
+        <h2>VLC release Security Bulletins <em>(SB)</em></h2>
+           <p>Those bulletins are related to each VLC release and can be made of multiple security issues, internal and external.</p>
+           <h3>2020</h3>
+           <dl>
+           <dt>VideoLAN-SB-VLC-309</dt>
+           <dd>Multiple vulnerabilities fixed in VLC media player 3.0.9/3.0.10
+            <a href="sb-vlc309.html">Details</a>
+           </dd>
+
+           <h2>2019</h2>
+           <dl>
+
+           <dt>VideoLAN-SB-VLC-308</dt>
+           <dd>Multiple vulnerabilities fixed in VLC media player 3.0.8
+            <a href="sb-vlc308.html">Details</a>
+           </dd>
+    </div>
+
+    <div class="col-md-6">
+
+       <h2>VideoAN security advisories</h2>
+
+       <p><strong>Please note</strong>:
+       The VideoLAN project does not issue security advisories
+       for underlying third party libraries.
+       Please refer to the concerned third parties as appropriate.
+       </p>
+       <h3>2019</h3>
+       <dl>
+
+       <dt>VideoLAN-SA-1901</dt>
+       <dd>Buffer overflow in avi demuxer & heap use after free in mkv demuxer
+        <a href="sa1901.html">Details</a>
+       </dd>
+
+       <h3>2018</h3>
+       <dl>
+
+       <dt>VideoLAN-SA-1801</dt>
+       <dd>Heap use after free in avformat demuxer
+        <a href="sa1801.html">Details</a>
+       </dd>
+
+       <h3>2016</h3>
+       <dl>
+
+       <dt>VideoLAN-SA-1601</dt>
+       <dd>Buffer Overflow in Processing QuickTime IMA Files
+        <a href="sa1601.html">Details</a>
+       </dd>
+
+       <h3>2015</h3>
+       <dl>
+
+       <dt>VideoLAN-SA-1501</dt>
+       <dd>Multiple heap and buffer overflows
+        <a href="sa1501.html">Details</a>
+       </dd>
+
+
+       <h3>2013</h3>
+       <dl>
+
+       <dt>VideoLAN-SA-1302 (CVE-2013-1954)</dt>
+       <dd>Overflow in ASF Demuxer
+        <a href="sa1302.html">Details</a>
+       </dd>
+
+       <dt>VideoLAN-SA-1301</dt>
+       <dd>Overflow in subtitles decoder
+        <a href="sa1301.html">Details</a>
+       </dd>
+
+
+       <h3>2012</h3>
+       <dl>
+
+       <dt>VideoLAN-SA-1203 (CVE-2012-5470)</dt>
+       <dd>Overflow in PNG decoder
+        <a href="sa1203.html">Details</a>
+       </dd>
+
+       <dt>VideoLAN-SA-1202 (CVE-2012-1776)</dt>
+       <dd>Heap overflows in Real RTPS protocol
+        <a href="sa1202.html">Details</a>
+       </dd>
+
+       <dt>VideoLAN-SA-1201 (CVE-2012-1775)</dt>
+       <dd>Stack overflow in MMS protocol
+        <a href="sa1201.html">Details</a>
+       </dd>
+
+
+       <h3>2011</h3>
+       <dl>
+       <dt>VideoLAN-SA-1108 (CVE-2012-0023)</dt>
+       <dd>Heap corruption in TiVo demuxer.
+        <a href="sa1108.html">Details</a>
+       </dd>
+
+       <dt>VideoLAN-SA-1107 (CVE-2011-3333)</dt>
+       <dd>NULL dereference in HTTP and RTSP server.
+        <a href="sa1107.html">Details</a>
+       </dd>
+
+       <dt>VideoLAN-SA-1106 (CVE-2011-2588)</dt>
+       <dd>Heap buffer overflow in AVI demuxer.
+        <a href="sa1106.html">Details</a>
+       </dd>
+
+       <dt>VideoLAN-SA-1105 (CVE-2011-2587)</dt>
+       <dd>Heap buffer overflow in RealMedia demuxer.
+        <a href="sa1105.html">Details</a>
+       </dd>
+
+       <dt>VideoLAN-SA-1104 (CVE-2011-2194)</dt>
+       <dd>Integer overflow in XSPF demuxer.
+        <a href="sa1104.html">Details</a>
+       </dd>
+
+       <dt>VideoLAN-SA-1103 (CVE-2011-1684)</dt>
+       <dd>Heap corruption in MP4 demuxer.
+        <a href="sa1103.html">Details</a>
+       </dd>
+
+       <dt>VideoLAN-SA-1102 (CVE-2011-0531)</dt>
+       <dd>Insufficient input validation in MKV demuxer.
+        <a href="sa1102.html">Details</a>
+       </dd>
+
+       <dt>VideoLAN-SA-1101 (CVE-2011-0021)</dt>
+       <dd>Heap corruption in CDG codec.
+        <a href="sa1101.html">Details</a>
+       </dd>
+       </dl>
+
+       <h3>2010</h3>
+       <dl>
+       <dt>VideoLAN-SA-1007 (CVE-2010-3907)</dt>
+       <dd>Buffer overflow in Real Media demuxer.
+        <a href="sa1007.html">Details</a>
+       </dd>
+
+       <dt>VideoLAN-SA-1006</dt>
+       <dd>Stack smashing in SMB/CIFS access.
+        <a href="sa1006.html">Details</a>
+       </dd>
+
+       <dt>VideoLAN-SA-1005 (CVE-2010-3124)</dt>
+       <dd>DLL preloading vulnerability.
+        <a href="sa1005.html">Details</a>
+       </dd>
+
+       <dt>VideoLAN-SA-1004 (CVE-2010-2937)</dt>
+       <dd>Insufficient input validation VLC TagLib plugin.
+        <a href="sa1004.html">Details</a>
+       </dd>
+
+       <dt>VideoLAN-SA-1003 (CVE-2010-1441..5)</dt>
+       <dd>Multiple vulnerabilities in VLC. <a href="sa1003.html">Details</a>
+       </dd>
+       <dt>VideoLAN-SA-1002</dt>
+       <dd>Buffer overflow in ancient VLC media player <a href="sa1002.html">Details</a>
+       </dd>
+       <dt>VideoLAN-SA-1001</dt>
+       <dd>Clam AntiVirus input validation error <a href="sa1001.html">Details</a>
+       </dd>
+       </dl>
+       <h3>2009</h3>
+
+       <dl>
+       <dt>VideoLAN-SA-0901</dt>
+       <dd>Stack overflows in VLC demuxers. <a href="sa0901.html">Details</a>
+       </dd>
+       </dl>
+       <h3>2008</h3>
+
+       <dl>
+       <dt>VideoLAN-SA-0811 (CVE-2008-5276)</dt>
+       <dd>Buffer overflows in VLC Real demuxers. <a href="sa0811.html">Details</a>
+       </dd>
+       <dt>VideoLAN-SA-0810 (CVE-2008-5032, CVE-2008-5036)</dt>
+       <dd>Multiple overflows in VLC demuxers. <a href="sa0810.html">Details</a>
+       </dd>
+       <dt>VideoLAN-SA-0809 (CVE-2008-4654, CVE-2008-4686)</dt>
+       <dd>Buffer overflow in VLC TiVo demuxer. <a href="sa0809.html">Details</a>
+       </dd>
+       <dt>VideoLAN-SA-0807 (CVE-2008-3732, CVE-2008-3794)</dt>
+       <dd>Multiple overflows in VLC demuxers. <a href="sa0807.html">Details</a>
+       </dd>
+       <dt>VideoLAN-SA-0806 (CVE-2008-2430)</dt>
+       <dd>Arbitrary code execution through potential heap-overflows in VLC's WAV demuxer. <a href="sa0806.html">Details</a>
+       </dd>
+       <dt>VideoLAN-SA-0805 (CVE-2008-2147)</dt>
+       <dd>Arbitrary code execution through rogue VLC plugins in the current directory. <a href="sa0805.html">Details</a>
+       </dd>
+       <dt>VideoLAN-SA-0804 (CVE-2007-6683)</dt>
+       <dd>Arbitrary file overwrite and other abuses through M3U parser and browsers plugins. <a href="sa0804.html">Details</a>
+       </dd>
+       <dt>VideoLAN-SA-0803 (CVE-2008-0073, CVE-2008-1489, CVE-2008-1768, CVE-2008-1769)</dt>
+       <dd>Arbitrary memory overwrite vulnerabilities in multiple modules:
+       Real RTSP demuxer, Real Media demuxer, MP4 demuxer, Cinepak decoder. <a href="sa0803.html">Details</a>
+       </dd>
+       <dt>VideoLAN-SA-0802, CORE-2008-0130 (CVE-2008-0984)</dt>
+       <dd>Arbitrary memory overwrite vulnerability in the MP4 demuxer. <a href="sa0802.html">Details</a>
+       </dd>
+       <dt>VideoLAN-SA-0801 (CVE-2007-6681, CVE-2007-6682, CVE-2008-0295, CVE-2008-0296)</dt>
+       <dd>Format string vulnerability in the Web interface. Stack-based buffer overflow in the Subtitles demuxer.
+       	String buffer overflows in the Real RTSP demuxer. <a href="sa0801.html">Details</a></dd>
+       </dl>
+
+       <h3>2007</h3>
+
+       <dl>
+       <dt>VideoLAN-SA-0703, CORE-2007-1004 (CVE-2007-6262)</dt>
+       <dd>Recursive plugin release vulnerability in the Active X plugin. <a href="sa0703.html">Details</a>
+       </dd>
+       <dt>VideoLAN-SA-0702 (CVE-2007-3316)</dt>
+       <dd>Format string injection in Vorbis, Theora, SAP and CDDA plugins. <a href="sa0702.html">Details</a>
+       </dd>
+       <dt>VideoLAN-SA-0701, MOAB-02-01-2007 (CVE-2007-0017)</dt>
+       <dd>URL format string injection in CDDA and VCDX plugins. <a href="sa0701.html">Details</a>
+       </dd>
+       </dl>
+
+   </div>
 </div>
 
 



View it on GitLab: https://code.videolan.org/VideoLAN.org/websites/-/commit/442052bc704118b2aa51e3c1f9d05afef171639c

-- 
View it on GitLab: https://code.videolan.org/VideoLAN.org/websites/-/commit/442052bc704118b2aa51e3c1f9d05afef171639c
You're receiving this email because of your account on code.videolan.org.




More information about the www-doc mailing list