diff options
author | Jan Beich <jbeich@FreeBSD.org> | 2018-06-08 07:52:39 +0000 |
---|---|---|
committer | Jan Beich <jbeich@FreeBSD.org> | 2018-06-08 07:52:39 +0000 |
commit | 766c7c46383e45c6bff43a3e5eff02e04013940a (patch) | |
tree | 2459b1608cb01570e58bf3b71abff096067bf651 /security | |
parent | c29c69be57a70fbb7e53ee674ae690ad97b03b95 (diff) | |
download | ports-766c7c46383e45c6bff43a3e5eff02e04013940a.tar.gz ports-766c7c46383e45c6bff43a3e5eff02e04013940a.zip |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 41 |
1 files changed, 41 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 3721cbc3b992..78c13333a74d 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,47 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="e3e68fe8-d9cb-4ba8-b09c-9e3a28588eb7"> + <topic>firefox -- Heap buffer overflow rasterizing paths in SVG with Skia</topic> + <affects> + <package> + <name>firefox</name> + <range><lt>60.0.2,1</lt></range> + </package> + <package> + <name>waterfox</name> + <range><lt>56.2.0.13_5</lt></range> + </package> + <package> + <name>firefox-esr</name> + <range><lt>52.8.1,1</lt></range> + </package> + <package> + <name>seamonkey</name> + <name>linux-seamonkey</name> + <range><lt>2.49.4</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Mozilla Foundation reports:</p> + <blockquote cite="https://www.mozilla.org/en-US/security/advisories/mfsa2018-14/"> + <p>A heap buffer overflow can occur in the Skia library when + rasterizing paths using a maliciously crafted SVG file + with anti-aliasing turned off. This results in a + potentially exploitable crash.</p> + </blockquote> + </body> + </description> + <references> + <url>https://www.mozilla.org/security/advisories/mfsa2018-14/</url> + </references> + <dates> + <discovery>2018-06-06</discovery> + <entry>2018-06-08</entry> + </dates> + </vuln> + <vuln vid="2dde5a56-6ab1-11e8-b639-6451062f0f7a"> <topic>Flash Player -- multiple vulnerabilities</topic> <affects> |