From owner-svn-ports-all@freebsd.org Wed Apr 29 18:48:51 2020 Return-Path: Delivered-To: svn-ports-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id BA4652BEB98; Wed, 29 Apr 2020 18:48:51 +0000 (UTC) (envelope-from tcberner@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 49C6wz4VvMz4dJQ; Wed, 29 Apr 2020 18:48:51 +0000 (UTC) (envelope-from tcberner@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 95FCCA065; Wed, 29 Apr 2020 18:48:51 +0000 (UTC) (envelope-from tcberner@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 03TImpfu010773; Wed, 29 Apr 2020 18:48:51 GMT (envelope-from tcberner@FreeBSD.org) Received: (from tcberner@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 03TImpBg010772; Wed, 29 Apr 2020 18:48:51 GMT (envelope-from tcberner@FreeBSD.org) Message-Id: <202004291848.03TImpBg010772@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: tcberner set sender to tcberner@FreeBSD.org using -f From: "Tobias C. Berner" Date: Wed, 29 Apr 2020 18:48:51 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r533382 - head/security/vuxml X-SVN-Group: ports-head X-SVN-Commit-Author: tcberner X-SVN-Commit-Paths: head/security/vuxml X-SVN-Commit-Revision: 533382 X-SVN-Commit-Repository: ports MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 29 Apr 2020 18:48:51 -0000 Author: tcberner Date: Wed Apr 29 18:48:50 2020 New Revision: 533382 URL: https://svnweb.freebsd.org/changeset/ports/533382 Log: Document multimedia/vlc vulnerabilities Security: CVE-2019-19721 CVE-2020-6071 CVE-2020-6072 CVE-2020-6073 CVE-2020-6077 CVE-2020-6078 CVE-2020-6079 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Wed Apr 29 17:17:52 2020 (r533381) +++ head/security/vuxml/vuln.xml Wed Apr 29 18:48:50 2020 (r533382) @@ -58,6 +58,44 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + vlc -- Multiple vulnerabilities fixed in VLC media player + + + vlc + 3.0.10,4 + + + + +

VideoLAN reports:

+
+

Details

+

A remote user could:

+
    +
  • Create a specifically crafted image file that could trigger an out of bounds read
  • +
  • Send a specifically crafter request to the microdns service discovery, potentially triggering various memory management issues
  • +
+

Impact

+

+If successful, a malicious third party could trigger either a crash of VLC or an arbitratry code execution with the privileges of the target user. +

+ While these issues in themselves are most likely to just crash the player, we can't exclude that they could be combined to leak user informations or remotely execute code. ASLR and DEP help reduce the likelyness of code execution, but may be bypassed.

+

+ We have not seen exploits performing code execution through these vulnerabilities

+

CVE-2019-19721 affects VLC 3.0.8 and earlier, and only reads 1 byte out of bound

+
+ +
+ + https://www.videolan.org/security/sb-vlc309.html + + + 2020-04-01 + 2020-04-29 + +
+ samba -- multiple vulnerabilities