diff options
author | Philip Paeps <philip@FreeBSD.org> | 2025-07-06 23:24:53 +0000 |
---|---|---|
committer | Philip Paeps <philip@FreeBSD.org> | 2025-07-06 23:24:53 +0000 |
commit | cef2c7afb0d4f96043eae761b23d857ed78a1ed5 (patch) | |
tree | 8c9218def996e3fc8208b8ccfc5db202bc9718e1 | |
parent | bd4004d39eaadf5b89b20894a16c1d00ee2cee67 (diff) |
-rw-r--r-- | security/vuxml/vuln/2025.xml | 31 |
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml index b7b2aaf6e7b6..df02c508bef1 100644 --- a/security/vuxml/vuln/2025.xml +++ b/security/vuxml/vuln/2025.xml @@ -1,3 +1,34 @@ + <vuln vid="7642ba72-5abf-11f0-87ba-002590c1f29c"> + <topic>FreeBSD -- Use-after-free in multi-threaded xz decoder</topic> + <affects> + <package> + <name>FreeBSD</name> + <range><ge>14.2</ge><lt>14.2_4</lt></range> + <range><ge>13.5</ge><lt>13.5_2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <p>A worker thread could free its input buffer after decoding, + while the main thread might still be writing to it. This leads to + an use-after-free condition on heap memory.</p> + <h1>Impact:</h1> + <p>An attacker may use specifically crafted .xz file to cause + multi-threaded xz decoder to crash, or potentially run arbitrary + code under the credential the decoder was executed.</p> + </body> + </description> + <references> + <cvename>CVE-2025-31115</cvename> + <freebsdsa>SA-25:06.xz</freebsdsa> + </references> + <dates> + <discovery>2025-07-02</discovery> + <entry>2025-07-06</entry> + </dates> + </vuln> + <vuln vid="69bfe2a4-5a39-11f0-8792-4ccc6adda413"> <topic>gstreamer1-plugins-bad -- stack buffer overflow in H.266 video parser</topic> <affects> |