Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 16 Nov 2020 11:13:15 +0000 (UTC)
From:      Dima Panov <fluffy@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r555466 - head/security/vuxml
Message-ID:  <202011161113.0AGBDFae076348@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: fluffy
Date: Mon Nov 16 11:13:14 2020
New Revision: 555466
URL: https://svnweb.freebsd.org/changeset/ports/555466

Log:
  VuXML: document mozjpeg and libjpeg-turbo recent vulnerabilities
  
  PR:		250190
  Submitted by:	daniel.engberg.lists@pyret.net

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Mon Nov 16 11:01:51 2020	(r555465)
+++ head/security/vuxml/vuln.xml	Mon Nov 16 11:13:14 2020	(r555466)
@@ -58,6 +58,63 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="040707f9-0b2a-11eb-8834-00155d01f202">
+    <topic>mozjpeg -- heap-based buffer over-read in get_rgb_row() in rdppm.c via a malformed PPM input file</topic>
+    <affects>
+      <package>
+	<name>mozjpeg</name>
+	<range><lt>4.0.0</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>NIST reports:</p>
+	<blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2020-13790">;
+	<ul>
+	   <li>Heap-based buffer over-read in get_rgb_row() in rdppm.c via a malformed PPM input file.</li>
+	</ul>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2020-13790</cvename>
+      <url>https://nvd.nist.gov/vuln/detail/CVE-2020-13790</url>;
+    </references>
+    <dates>
+      <discovery>2020-06-03</discovery>
+      <entry>2020-10-10</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="23a667c7-0b28-11eb-8834-00155d01f202">
+    <topic>libjpeg-turbo -- Issue in the PPM reader causing a buffer overrun in cjpeg, TJBench, or the tjLoadImage() function.</topic>
+    <affects>
+      <package>
+	<name>libjpeg-turbo</name>
+	<range><lt>2.0.4</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>libjpeg-turbo releases reports:</p>
+	<blockquote cite="https://github.com/libjpeg-turbo/libjpeg-turbo/releases/tag/2.0.5">;
+	  <p>This release fixes the following security issue:</p>
+	  <ul>
+	     <li>Heap-based buffer over-read in get_rgb_row() in rdppm.c via a malformed PPM input file.</li>
+	  </ul>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2020-13790</cvename>
+      <url>https://nvd.nist.gov/vuln/detail/CVE-2020-13790</url>;
+    </references>
+    <dates>
+      <discovery>2020-06-03</discovery>
+      <entry>2020-10-10</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="19259833-26b1-11eb-a239-1c697a013f4b">
     <topic>mantis -- multiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202011161113.0AGBDFae076348>