Date: Thu, 16 Jul 2020 12:02:38 +0000 (UTC) From: Matthias Andree <mandree@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r542351 - head/security/vuxml Message-ID: <202007161202.06GC2cfg069696@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: mandree Date: Thu Jul 16 12:02:37 2020 New Revision: 542351 URL: https://svnweb.freebsd.org/changeset/ports/542351 Log: vuln db: record OpenEXR/ilmbase < 2.5.2 vulnerabilities Security: 714e6c35-c75b-11ea-aa29-d74973d1f9f3 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Jul 16 11:18:52 2020 (r542350) +++ head/security/vuxml/vuln.xml Thu Jul 16 12:02:37 2020 (r542351) @@ -58,6 +58,40 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="714e6c35-c75b-11ea-aa29-d74973d1f9f3"> + <topic>OpenEXR/ilmbase 2.5.2 -- patch release with various bug/security fixes</topic> + <affects> + <package> + <name>ilmbase</name> + <range><lt>2.5.2</lt></range> + </package> + <package> + <name>openexr</name> + <range><lt>2.5.2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Cary Phillips reports:</p> + <blockquote cite="https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.5.2"> + <p>openexr 2.5.2 [is a p]atch release with various bug/security and build/install fixes:</p> + <ul> + <li>Invalid input could cause a heap-use-after-free error in DeepScanLineInputFile::DeepScanLineInputFile()</li> + <li>Invalid chunkCount attributes could cause heap buffer overflow in getChunkOffsetTableSize()</li> + <li>Invalid tiled input file could cause invalid memory access TiledInputFile::TiledInputFile()</li> + </ul> + </blockquote> + </body> + </description> + <references> + <url>https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.5.2</url> + </references> + <dates> + <discovery>2020-05-18</discovery> + <entry>2020-07-16</entry> + </dates> + </vuln> + <vuln vid="870d59b0-c6c4-11ea-8015-e09467587c17"> <topic>chromium -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202007161202.06GC2cfg069696>