Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 20 Apr 2017 15:29:21 +0000 (UTC)
From:      Jan Beich <jbeich@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r438968 - head/security/vuxml
Message-ID:  <201704201529.v3KFTL43055774@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: jbeich
Date: Thu Apr 20 15:29:21 2017
New Revision: 438968
URL: https://svnweb.freebsd.org/changeset/ports/438968

Log:
  security/vuxml: mark old sndfile/samplerate/tiff as vulnerable

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Thu Apr 20 14:58:47 2017	(r438967)
+++ head/security/vuxml/vuln.xml	Thu Apr 20 15:29:21 2017	(r438968)
@@ -58,6 +58,216 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="2a96e498-3234-4950-a9ad-419bc84a839d">
+    <topic>tiff -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>tiff</name>
+	<name>linux-f8-tiff</name>
+	<name>linux-f10-tiff</name>
+	<name>linux-c6-tiff</name>
+	<name>linux-c7-tiff</name>
+	<range><lt>4.0.8</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>NVD reports:</p>
+	<blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2017-5225">;
+	  <p>LibTIFF version 4.0.7 is vulnerable to a heap buffer
+	    overflow in the tools/tiffcp resulting in DoS or code
+	    execution via a crafted BitsPerSample value.</p>
+	</blockquote>
+	<blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2017-7592">;
+	  <p>The putagreytile function in tif_getimage.c in LibTIFF
+	    4.0.7 has a left-shift undefined behavior issue, which
+	    might allow remote attackers to cause a denial of service
+	    (application crash) or possibly have unspecified other
+	    impact via a crafted image.</p>
+	</blockquote>
+	<blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2017-7593">;
+	  <p>tif_read.c in LibTIFF 4.0.7 does not ensure that
+	    tif_rawdata is properly initialized, which might allow
+	    remote attackers to obtain sensitive information from
+	    process memory via a crafted image.</p>
+	</blockquote>
+	<blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2017-7594">;
+	  <p>The OJPEGReadHeaderInfoSecTablesDcTable function in
+	    tif_ojpeg.c in LibTIFF 4.0.7 allows remote attackers to
+	    cause a denial of service (memory leak) via a crafted
+	    image.</p>
+	</blockquote>
+	<blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2017-7595">;
+	  <p>The JPEGSetupEncode function in tiff_jpeg.c in LibTIFF
+	    4.0.7 allows remote attackers to cause a denial of service
+	    (divide-by-zero error and application crash) via a crafted
+	    image.</p>
+	</blockquote>
+	<blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2017-7596">;
+	  <p>LibTIFF 4.0.7 has an "outside the range of
+	    representable values of type float" undefined behavior
+	    issue, which might allow remote attackers to cause a
+	    denial of service (application crash) or possibly have
+	    unspecified other impact via a crafted image.</p>
+	</blockquote>
+	<blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2017-7597">;
+	  <p>tif_dirread.c in LibTIFF 4.0.7 has an "outside the
+	    range of representable values of type float" undefined
+	    behavior issue, which might allow remote attackers to
+	    cause a denial of service (application crash) or possibly
+	    have unspecified other impact via a crafted image.</p>
+	</blockquote>
+	<blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2017-7598">;
+	  <p>tif_dirread.c in LibTIFF 4.0.7 might allow remote
+	    attackers to cause a denial of service (divide-by-zero
+	    error and application crash) via a crafted image.</p>
+	</blockquote>
+	<blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2017-7599">;
+	  <p>LibTIFF 4.0.7 has an "outside the range of
+	    representable values of type short" undefined behavior
+	    issue, which might allow remote attackers to cause a
+	    denial of service (application crash) or possibly have
+	    unspecified other impact via a crafted image.</p>
+	</blockquote>
+	<blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2017-7600">;
+	  <p>LibTIFF 4.0.7 has an "outside the range of
+	    representable values of type unsigned char" undefined
+	    behavior issue, which might allow remote attackers to
+	    cause a denial of service (application crash) or possibly
+	    have unspecified other impact via a crafted image.</p>
+	</blockquote>
+	<blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2017-7601">;
+	  <p>LibTIFF 4.0.7 has a "shift exponent too large for
+	    64-bit type long" undefined behavior issue, which might
+	    allow remote attackers to cause a denial of service
+	    (application crash) or possibly have unspecified other
+	    impact via a crafted image.</p>
+	</blockquote>
+	<blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2017-7602">;
+	  <p>LibTIFF 4.0.7 has a signed integer overflow, which
+	    might allow remote attackers to cause a denial of service
+	    (application crash) or possibly have unspecified other
+	    impact via a crafted image.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2017-5225</cvename>
+      <cvename>CVE-2017-7592</cvename>
+      <cvename>CVE-2017-7593</cvename>
+      <cvename>CVE-2017-7594</cvename>
+      <cvename>CVE-2017-7595</cvename>
+      <cvename>CVE-2017-7596</cvename>
+      <cvename>CVE-2017-7597</cvename>
+      <cvename>CVE-2017-7598</cvename>
+      <cvename>CVE-2017-7599</cvename>
+      <cvename>CVE-2017-7600</cvename>
+      <cvename>CVE-2017-7601</cvename>
+      <cvename>CVE-2017-7602</cvename>
+      <url>https://github.com/vadz/libtiff/commit/5c080298d59e</url>;
+      <url>https://github.com/vadz/libtiff/commit/48780b4fcc42</url>;
+      <url>https://github.com/vadz/libtiff/commit/d60332057b95</url>;
+      <url>https://github.com/vadz/libtiff/commit/2ea32f7372b6</url>;
+      <url>https://github.com/vadz/libtiff/commit/8283e4d1b7e5</url>;
+      <url>https://github.com/vadz/libtiff/commit/47f2fb61a3a6</url>;
+      <url>https://github.com/vadz/libtiff/commit/3cfd62d77c2a</url>;
+      <url>https://github.com/vadz/libtiff/commit/3144e57770c1</url>;
+      <url>https://github.com/vadz/libtiff/commit/0a76a8c765c7</url>;
+      <url>https://github.com/vadz/libtiff/commit/66e7bd595209</url>;
+    </references>
+    <dates>
+      <discovery>2017-04-01</discovery>
+      <entry>2017-04-20</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="d44129d6-b22e-4e9c-b200-6a46e8bd3e60">
+    <topic>libsamplerate -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>libsamplerate</name>
+	<name>linux-c6-libsamplerate</name>
+	<name>linux-c7-libsamplerate</name>
+	<range><lt>0.1.9</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>NVD reports:</p>
+	<blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2017-7697">;
+	  <p>In libsamplerate before 0.1.9, a buffer over-read
+	    occurs in the calc_output_single function in src_sinc.c
+	    via a crafted audio file.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2017-7697</cvename>
+      <url>https://github.com/erikd/libsamplerate/commit/c3b66186656d</url>;
+    </references>
+    <dates>
+      <discovery>2017-04-11</discovery>
+      <entry>2017-04-20</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="5a97805e-93ef-4dcb-8d5e-dbcac263bfc2">
+    <topic>libsndfile -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>libsndfile</name>
+	<name>linux-c6-libsndfile</name>
+	<name>linux-c7-libsndfile</name>
+	<range><lt>1.0.28</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>NVD reports:</p>
+	<blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2017-7585">;
+	  <p>In libsndfile before 1.0.28, an error in the
+	    "flac_buffer_copy()" function (flac.c) can be exploited to
+	    cause a stack-based buffer overflow via a specially crafted
+	    FLAC file.</p>
+	</blockquote>
+	<blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2017-7586">;
+	  <p>In libsndfile before 1.0.28, an error in the
+	    "header_read()" function (common.c) when handling ID3 tags
+	    can be exploited to cause a stack-based buffer overflow
+	    via a specially crafted FLAC file.</p>
+	</blockquote>
+	<blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2017-7741">;
+	  <p>In libsndfile before 1.0.28, an error in the
+	    "flac_buffer_copy()" function (flac.c) can be exploited to
+	    cause a segmentation violation (with write memory access)
+	    via a specially crafted FLAC file during a resample
+	    attempt, a similar issue to CVE-2017-7585.</p>
+	</blockquote>
+	<blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2017-7742">;
+	  <p>In libsndfile before 1.0.28, an error in the
+	    "flac_buffer_copy()" function (flac.c) can be exploited to
+	    cause a segmentation violation (with read memory access)
+	    via a specially crafted FLAC file during a resample
+	    attempt, a similar issue to CVE-2017-7585.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2017-7585</cvename>
+      <cvename>CVE-2017-7586</cvename>
+      <cvename>CVE-2017-7741</cvename>
+      <cvename>CVE-2017-7742</cvename>
+      <url>https://github.com/erikd/libsndfile/commit/60b234301adf</url>;
+      <url>https://github.com/erikd/libsndfile/commit/708e996c87c5</url>;
+      <url>https://github.com/erikd/libsndfile/commit/f457b7b5ecfe</url>;
+      <url>https://github.com/erikd/libsndfile/commit/60b234301adf</url>;
+    </references>
+    <dates>
+      <discovery>2017-04-07</discovery>
+      <entry>2017-04-20</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="3e2e9b44-25ce-11e7-a175-939b30e0836d">
     <topic>cURL -- TLS session resumption client cert bypass (again)</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201704201529.v3KFTL43055774>