Hello Ross,


Im very pleased to hear that you fixed the vulnerability so fast after my 
report to the mailing list. Will you also request a CVE for this vulnerability?



Kind regards,



Mans van Someren





---- On wo, 27 feb 2019 10:00:26 +0100 Ross Finlayson <finlay...@live555.com> 
wrote ----




Thanks for the note.



First, please note that we do not support any version of the LIVE555 code 
that’s hosted on a third-party site (e.g., ‘GitHub’).  Nor should any bug 
reports be filed at such sites (because we won’t get to read them).  Instead, 
bug reports should be filed only using this mailing list, or by email to 
"support(at)live555.com”.



However, your reported bug happens to be applicable to the official version of 
the code.  (The actual bug was that “sscanf()” was not behaving how I expected.)



I have now installed a new version - 2019.02.27 - of the code that should fix 
this bug.  Those of you who are using the code to build a RTSP server (or a 
RTSP proxy server) should upgrade to using this new version ASAP.



Thanks again for the bug report. 





Ross Finlayson

Live Networks, Inc.

http://www.live555.com/





_______________________________________________

live-devel mailing list

mailto:live-devel@lists.live555.com

http://lists.live555.com/mailman/listinfo/live-devel
_______________________________________________
live-devel mailing list
live-devel@lists.live555.com
http://lists.live555.com/mailman/listinfo/live-devel

Reply via email to