Date: Tue, 27 Jun 2023 21:16:29 GMT From: Matthias Andree <mandree@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: e0d54fd9facd - main - security/vuxml: document openexr dwa out-of-bounds read Message-ID: <202306272116.35RLGT7N015489@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by mandree: URL: https://cgit.FreeBSD.org/ports/commit/?id=e0d54fd9facd23a7d338f3b8fa8a9514264e9424 commit e0d54fd9facd23a7d338f3b8fa8a9514264e9424 Author: Matthias Andree <mandree@FreeBSD.org> AuthorDate: 2023-06-27 21:14:17 +0000 Commit: Matthias Andree <mandree@FreeBSD.org> CommitDate: 2023-06-27 21:16:19 +0000 security/vuxml: document openexr dwa out-of-bounds read OSS-Fuzz 59382 Security: 06428d91-152e-11ee-8b14-dbdd62da85fb --- security/vuxml/vuln/2023.xml | 36 ++++++++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index 1215aa110f42..822d7481c29b 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -1,3 +1,39 @@ + <vuln vid="06428d91-152e-11ee-8b14-dbdd62da85fb"> + <topic>OpenEXR -- heap buffer overflow in internal_huf_decompress</topic> + <affects> + <package> + <name>openexr</name> + <range><lt>3.1.9</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>oss-fuzz reports:</p> + <blockquote cite="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=59382"> + <p>heap buffer overflow in internal_huf_decompress.</p> + </blockquote> + <p>Cary Phillips reports:</p> + <blockquote cite="https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.9"> + <p>v3.1.9 - Patch release that addresses [...] also OSS-fuzz 59382 Heap-buffer-overflow in internal_huf_decompress</p> + </blockquote> + <p>Kimball Thurston reports:</p> + <blockquote cite="https://github.com/AcademySoftwareFoundation/openexr/pull/1439"> + <p>Fix scenario where malformed dwa file could read past end of buffer - fixes OSS-Fuzz 59382</p> + </blockquote> + </body> + </description> + <references> + <url>https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=59382</url> + <url>https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.9</url> + <url>https://github.com/AcademySoftwareFoundation/openexr/commit/e431f7e189d0785bb84a5bfb83391e9e58590c49</url> + <url>https://github.com/AcademySoftwareFoundation/openexr/pull/1439</url> + </references> + <dates> + <discovery>2023-05-28</discovery> + <entry>2023-06-27</entry> + </dates> + </vuln> + <vuln vid="ad05a737-14bd-11ee-8290-a8a1599412c6"> <topic>chromium -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202306272116.35RLGT7N015489>