Date: Mon, 2 Mar 2020 18:32:07 +0000 (UTC) From: Koop Mast <kwm@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r527647 - head/security/vuxml Message-ID: <202003021832.022IW7mI097265@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: kwm Date: Mon Mar 2 18:32:07 2020 New Revision: 527647 URL: https://svnweb.freebsd.org/changeset/ports/527647 Log: Document librsvg2 vulnabilities. Security: CVE-2019-20446 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Mon Mar 2 17:35:42 2020 (r527646) +++ head/security/vuxml/vuln.xml Mon Mar 2 18:32:07 2020 (r527647) @@ -58,6 +58,45 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="b66583ae-5aee-4cd5-bb31-b2d397f8b6b3"> + <topic>librsvg2 -- multiple vulnabilities</topic> + <affects> + <package> + <name>librsvg2</name> + <range><lt>2.40.21</lt></range> + </package> + <package> + <name>librsvg2-rust</name> + <range><ge>2.41.0</ge><lt>2.46.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Librsvg2 developers reports:</p> + <blockquote cite="https://mail.gnome.org/archives/ftp-release-list/2020-February/msg00133.htmlE"> + <p>Backport the following fixes from 2.46.x:</p> + <p>Librsvg now has limits on the number of loaded XML elements, + and the number of referenced elements within an SVG document. This + is to mitigate malicious SVGs which try to consume all memory, and + those which try to consume an exponential amount of CPU time.</p> + <p>Fix stack exhaustion with circular references in <use> elements.</p> + <p>Fix a denial-of-service condition from exponential explosion + of rendered elements, through nested use of SVG <use> elements in + malicious SVGs. This is similar to the XML "billion laughs attack" + but for SVG instancing.</p> + </blockquote> + </body> + </description> + <references> + <url>https://mail.gnome.org/archives/ftp-release-list/2020-February/msg00133.html</url> + <cvename>CVE-2019-20446</cvename> + </references> + <dates> + <discovery>2020-02-26</discovery> + <entry>2020-03-02</entry> + </dates> + </vuln> + <vuln vid="d37407bd-5c5f-11ea-bb2a-8c164582fbac"> <topic>TiMidity++ -- Multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202003021832.022IW7mI097265>