svn commit: r551528 - head/security/vuxml
Sunpoet Po-Chuan Hsieh
sunpoet at FreeBSD.org
Mon Oct 5 17:26:02 UTC 2020
Author: sunpoet
Date: Mon Oct 5 17:25:55 2020
New Revision: 551528
URL: https://svnweb.freebsd.org/changeset/ports/551528
Log:
Document libexif vulnerability
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Mon Oct 5 17:25:33 2020 (r551527)
+++ head/security/vuxml/vuln.xml Mon Oct 5 17:25:55 2020 (r551528)
@@ -58,6 +58,49 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="cff0b2e2-0716-11eb-9e5d-08002728f74c">
+ <topic>libexif -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>libexif</name>
+ <range><lt>0.6.22</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Release notes:</p>
+ <blockquote cite="https://github.com/libexif/libexif/blob/master/NEWS">
+ <p>Lots of fixes exposed by fuzzers like AFL, ClusterFuzz, OSSFuzz and others:</p>
+ <p>CVE-2016-6328: fixed integer overflow when parsing maker notes</p>
+ <p>CVE-2017-7544: fixed buffer overread</p>
+ <p>CVE-2018-20030: Fix for recursion DoS</p>
+ <p>CVE-2019-9278: replaced integer overflow checks the compiler could optimize away by safer constructs</p>
+ <p>CVE-2020-0093: read overflow</p>
+ <p>CVE-2020-12767: fixed division by zero </p>
+ <p>CVE-2020-13112: Various buffer overread fixes due to integer overflows in maker notes</p>
+ <p>CVE-2020-13113: Potential use of uninitialized memory </p>
+ <p>CVE-2020-13114: Time consumption DoS when parsing canon array markers</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/libexif/libexif/blob/master/NEWS</url>
+ <url>CVE-2016-6328</url>
+ <url>CVE-2017-7544</url>
+ <url>CVE-2018-20030</url>
+ <url>CVE-2019-9278</url>
+ <url>CVE-2020-0093</url>
+ <url>CVE-2020-12767</url>
+ <url>CVE-2020-13112</url>
+ <url>CVE-2020-13113</url>
+ <url>CVE-2020-13114</url>
+ </references>
+ <dates>
+ <discovery>2020-05-18</discovery>
+ <entry>2020-10-05</entry>
+ </dates>
+ </vuln>
+
<vuln vid="c71ed065-0600-11eb-8758-e0d55e2a8bf9">
<topic>kdeconnect -- packet manipulation can be exploited in a Denial of Service attack</topic>
<affects>
More information about the svn-ports-all
mailing list