aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml41
1 files changed, 41 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 3721cbc3b992..78c13333a74d 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,47 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="e3e68fe8-d9cb-4ba8-b09c-9e3a28588eb7">
+ <topic>firefox -- Heap buffer overflow rasterizing paths in SVG with Skia</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>60.0.2,1</lt></range>
+ </package>
+ <package>
+ <name>waterfox</name>
+ <range><lt>56.2.0.13_5</lt></range>
+ </package>
+ <package>
+ <name>firefox-esr</name>
+ <range><lt>52.8.1,1</lt></range>
+ </package>
+ <package>
+ <name>seamonkey</name>
+ <name>linux-seamonkey</name>
+ <range><lt>2.49.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Mozilla Foundation reports:</p>
+ <blockquote cite="https://www.mozilla.org/en-US/security/advisories/mfsa2018-14/">
+ <p>A heap buffer overflow can occur in the Skia library when
+ rasterizing paths using a maliciously crafted SVG file
+ with anti-aliasing turned off. This results in a
+ potentially exploitable crash.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.mozilla.org/security/advisories/mfsa2018-14/</url>
+ </references>
+ <dates>
+ <discovery>2018-06-06</discovery>
+ <entry>2018-06-08</entry>
+ </dates>
+ </vuln>
+
<vuln vid="2dde5a56-6ab1-11e8-b639-6451062f0f7a">
<topic>Flash Player -- multiple vulnerabilities</topic>
<affects>