Date: Thu, 20 Jun 2019 15:54:14 +0000 (UTC) From: Thomas Zander <riggs@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r504635 - head/security/vuxml Message-ID: <201906201554.x5KFsEi5063545@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: riggs Date: Thu Jun 20 15:54:14 2019 New Revision: 504635 URL: https://svnweb.freebsd.org/changeset/ports/504635 Log: Document two vulnerabilities in vlc < 3.0.7.1, potential remote exploit Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Jun 20 15:33:44 2019 (r504634) +++ head/security/vuxml/vuln.xml Thu Jun 20 15:54:14 2019 (r504635) @@ -58,6 +58,63 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="5b218581-9372-11e9-8fc4-5404a68ad561"> + <topic>vlc -- Double free in Matroska demuxer</topic> + <affects> + <package> + <name>vlc</name> + <range><lt>3.0.7.1,4</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The VLC project reports:</p> + <blockquote cite="http://git.videolan.org/?p=vlc.git;a=commit;h=81023659c7de5ac2637b4a879195efef50846102"> + <p>mkv: Fix potential double free</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2019-12874</cvename> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12874</url> + <url>http://git.videolan.org/?p=vlc.git;a=commit;h=81023659c7de5ac2637b4a879195efef50846102</url> + </references> + <dates> + <discovery>2019-05-20</discovery> + <entry>2019-06-20</entry> + </dates> + </vuln> + + <vuln vid="f2144530-936f-11e9-8fc4-5404a68ad561"> + <topic>vlc -- Buffer overflow vulnerability</topic> + <affects> + <package> + <name>vlc</name> + <range><lt>3.0.7,4</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>zhangyang reports:</p> + <blockquote cite="https://hackerone.com/reports/484398"> + <p>The ReadFrame function in the avi.c file uses a variable i_width_bytes, + which is obtained directly from the file. It is a signed integer. + It does not do a strict check before the memory operation(memmove, memcpy), + which may cause a buffer overflow.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2019-5439</cvename> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5439</url> + <url>https://hackerone.com/reports/484398</url> + </references> + <dates> + <discovery>2019-01-23</discovery> + <entry>2019-06-20</entry> + </dates> + </vuln> + <vuln vid="0cea6e0a-7a39-4dac-b3ec-dbc13d404f76"> <topic>mozilla -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201906201554.x5KFsEi5063545>