From owner-svn-ports-head@freebsd.org Sun Sep 20 05:27:38 2015 Return-Path: Delivered-To: svn-ports-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 96851A01126; Sun, 20 Sep 2015 05:27:38 +0000 (UTC) (envelope-from jbeich@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 7EE281A2F; Sun, 20 Sep 2015 05:27:38 +0000 (UTC) (envelope-from jbeich@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.70]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id t8K5Rcdh005383; Sun, 20 Sep 2015 05:27:38 GMT (envelope-from jbeich@FreeBSD.org) Received: (from jbeich@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id t8K5Rc9q005382; Sun, 20 Sep 2015 05:27:38 GMT (envelope-from jbeich@FreeBSD.org) Message-Id: <201509200527.t8K5Rc9q005382@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: jbeich set sender to jbeich@FreeBSD.org using -f From: Jan Beich Date: Sun, 20 Sep 2015 05:27:38 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r397357 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 20 Sep 2015 05:27:38 -0000 Author: jbeich Date: Sun Sep 20 05:27:37 2015 New Revision: 397357 URL: https://svnweb.freebsd.org/changeset/ports/397357 Log: Document recent ffmpeg vulnerabilities libav 11.4 was released before the fixes were made while ffmpeg 2.3.x and lower are not maintained anymore. Bundle consumers are out of luck unless low impact there or the fixes are easy to cherry-pick. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sun Sep 20 04:18:52 2015 (r397356) +++ head/security/vuxml/vuln.xml Sun Sep 20 05:27:37 2015 (r397357) @@ -58,6 +58,192 @@ Notes: --> + + ffmpeg -- multiple vulnerabilities + + + libav + + 0 + + + gstreamer1-libav + + 1.5.90 + + + gstreamer-ffmpeg + + + 0 + + + handbrake + + + 0 + + + ffmpeg + 2.7.2,1 + + + ffmpeg26 + 2.6.4 + + + ffmpeg25 + 2.5.8 + + + ffmpeg24 + 2.4.11 + + + ffmpeg-devel + ffmpeg23 + ffmpeg2 + ffmpeg1 + ffmpeg-011 + ffmpeg0 + + 0 + + + avidemux + avidemux2 + avidemux26 + + 2.6.11 + + + kodi + + 15.1 + + + mplayer + mencoder + + 1.1.r20150822 + + + mythtv + mythtv-frontend + + + 0 + + + plexhometheater + + + 0 + + + + +

NVD reports:

+
+

The decode_ihdr_chunk function in libavcodec/pngdec.c in + FFmpeg before 2.7.2 does not enforce uniqueness of the IHDR + (aka image header) chunk in a PNG image, which allows remote + attackers to cause a denial of service (out-of-bounds array + access) or possibly have unspecified other impact via a + crafted image with two or more of these chunks.

+
+
+

Multiple integer underflows in the ff_mjpeg_decode_frame + function in libavcodec/mjpegdec.c in FFmpeg before 2.7.2 + allow remote attackers to cause a denial of service + (out-of-bounds array access) or possibly have unspecified + other impact via crafted MJPEG data.

+
+
+

The ff_sbr_apply function in libavcodec/aacsbr.c in + FFmpeg before 2.7.2 does not check for a matching AAC frame + syntax element before proceeding with Spectral Band + Replication calculations, which allows remote attackers to + cause a denial of service (out-of-bounds array access) or + possibly have unspecified other impact via crafted AAC + data.

+
+
+

The ff_mpv_common_init function in libavcodec/mpegvideo.c + in FFmpeg before 2.7.2 does not properly maintain the + encoding context, which allows remote attackers to cause a + denial of service (invalid pointer access) or possibly have + unspecified other impact via crafted MPEG data.

+
+
+

The destroy_buffers function in libavcodec/sanm.c in + FFmpeg before 2.7.2 does not properly maintain height and + width values in the video context, which allows remote + attackers to cause a denial of service (segmentation + violation and application crash) or possibly have + unspecified other impact via crafted LucasArts Smush video + data.

+
+
+

The allocate_buffers function in libavcodec/alac.c in + FFmpeg before 2.7.2 does not initialize certain context + data, which allows remote attackers to cause a denial of + service (segmentation violation) or possibly have + unspecified other impact via crafted Apple Lossless Audio + Codec (ALAC) data.

+
+
+

The sws_init_context function in libswscale/utils.c in + FFmpeg before 2.7.2 does not initialize certain pixbuf data + structures, which allows remote attackers to cause a denial + of service (segmentation violation) or possibly have + unspecified other impact via crafted video data.

+
+
+

The ff_frame_thread_init function in + libavcodec/pthread_frame.c in FFmpeg before 2.7.2 mishandles + certain memory-allocation failures, which allows remote + attackers to cause a denial of service (invalid pointer + access) or possibly have unspecified other impact via a + crafted file, as demonstrated by an AVI file.

+
+
+

The ff_rv34_decode_init_thread_copy function in + libavcodec/rv34.c in FFmpeg before 2.7.2 does not initialize + certain structure members, which allows remote attackers to + cause a denial of service (invalid pointer access) or + possibly have unspecified other impact via crafted (1) RV30 + or (2) RV40 RealVideo data.

+
+ +
+ + CVE-2015-6818 + CVE-2015-6819 + CVE-2015-6820 + CVE-2015-6821 + CVE-2015-6822 + CVE-2015-6823 + CVE-2015-6824 + CVE-2015-6825 + CVE-2015-6826 + https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=47f4e2d8960ca756ca153ab8e3e93d80449b8c91 + https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=84afc6b70d24fc0bf686e43138c96cf60a9445fe + https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=79a98294da6cd85f8c86b34764c5e0c43b09eea3 + https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b160fc290cf49b516c5b6ee0730fd9da7fc623b1 + https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=39bbdebb1ed8eb9c9b0cd6db85afde6ba89d86e4 + https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=f7068bf277a37479aecde2832208d820682b35e6 + https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a5d44d5c220e12ca0cb7a4eceb0f74759cb13111 + https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=f1a38264f20382731cf2cc75fdd98f4c9a84a626 + https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3197c0aa87a3b7190e17d49e6fbc7b554e4b3f0a + https://ffmpeg.org/security.html + + + 2015-09-05 + 2015-09-20 + +
+ moodle -- multiple vulnerabilities