diff options
author | Matthias Andree <mandree@FreeBSD.org> | 2019-12-29 12:11:09 +0000 |
---|---|---|
committer | Matthias Andree <mandree@FreeBSD.org> | 2019-12-29 12:11:09 +0000 |
commit | 4d15461f06bd11e28802625f189ea053558d2ca9 (patch) | |
tree | a253d18b1d6710c284dbdbf614509f803b92cd44 /security | |
parent | 03535a0e4b7439f9080ea31f4e57031359c4deba (diff) |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 38 |
1 files changed, 38 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index bc1e8a914fec..502b814dae6b 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,44 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="e4d9dffb-2a32-11ea-9693-e1b3f6feec79"> + <topic>OpenEXR -- heap buffer overflow, and out-of-memory bugs</topic> + <affects> + <package> + <name>ilmbase</name> + <range><lt>2.3.0_4</lt></range> + </package> + <package> + <name>openexr</name> + <range><lt>2.3.0_3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Cary Phillips reports:</p> + <blockquote cite="https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.4.0"> + <p>OpenEXR (IlmBase) v2.4.0 fixes the following security vulnerabilities:</p> + <ul> + <li>CVE-2018-18444 Issue #351 Out of Memory</li> + <li>CVE-2018-18443 Issue #350 heap-buffer-overflow</li> + </ul> + <p>The relevant patches have been backported to the FreeBSD ports.</p> + </blockquote> + </body> + </description> + <references> + <url>https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.4.0</url> + <url>https://github.com/AcademySoftwareFoundation/openexr/issues/350</url> + <url>https://github.com/AcademySoftwareFoundation/openexr/issues/351</url> + <cvename>CVE-2018-18443</cvename> + <cvename>CVE-2018-18444</cvename> + </references> + <dates> + <discovery>2018-10-17</discovery> + <entry>2019-12-29</entry> + </dates> + </vuln> + <vuln vid="7b97b32e-27c4-11ea-9673-4c72b94353b5"> <topic>wordpress -- multiple issues</topic> <affects> |