FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-29 10:45:39 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
faf7c1d0-f5bb-47b4-a6a8-ef57317b9766ffmpeg -- multiple vulnerabilities

NVD reports:

An issue was discovered in the FFmpeg package, where vp3_decode_frame in libavcodec/vp3.c lacks check of the return value of av_malloc() and will cause a null pointer dereference, impacting availability.

A null pointer dereference issue was discovered in 'FFmpeg' in decode_main_header() function of libavformat/nutdec.c file. The flaw occurs because the function lacks check of the return value of avformat_new_stream() and triggers the null pointer dereference error, causing an application to crash.

A vulnerability classified as problematic has been found in ffmpeg. This affects an unknown part of the file libavcodec/rpzaenc.c of the component QuickTime RPZA Video Encoder. The manipulation of the argument y_size leads to out-of-bounds read. It is possible to initiate the attack remotely. The name of the patch is 92f9b28ed84a77138105475beba16c146bdaf984. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-213543.


Discovery 2022-11-12
Entry 2023-04-07
Modified 2023-04-10
ffmpeg
ge 5.1,1 lt 5.1.3,1

ge 5.0,1 lt 5.0.3,1

< 4.4.4,1

ffmpeg4
< 4.4.4

avidemux
le 2.9

emby-server
emby-server-devel
ge 0

handbrake
< 1.6.0

mythtv
mythtv-frontend
le 33.0,1

CVE-2022-3109
CVE-2022-3341
CVE-2022-3964
https://git.ffmpeg.org/gitweb/ffmpeg.git/commitdiff/2cdddcd6ec90c7a248ffe792d85faa4d89eab9f7
https://git.ffmpeg.org/gitweb/ffmpeg.git/commitdiff/481e81be1271ac9a0124ee615700390c2371bd89
https://git.ffmpeg.org/gitweb/ffmpeg.git/commitdiff/1eb002596e3761d88de4aeea3158692b82fb6307
https://ffmpeg.org/security.html
6ac79ed8-ccc2-11e5-932b-5404a68ad561ffmpeg -- remote denial of service in JPEG2000 decoder

FFmpeg security reports:

FFmpeg 2.8.6 fixes the following vulnerabilities: CVE-2016-2213


Discovery 2016-01-27
Entry 2016-02-06
ffmpeg
< 2.8.6,1

mplayer
mencoder
< 1.2.r20151219_3

CVE-2016-2213
https://www.ffmpeg.org/security.html
4bae544d-06a3-4352-938c-b3bcbca89298ffmpeg -- multiple vulnerabilities

NVD reports:

The ff_dwt_decode function in libavcodec/jpeg2000dwt.c in FFmpeg before 2.8.4 does not validate the number of decomposition levels before proceeding with Discrete Wavelet Transform decoding, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JPEG 2000 data.

The ff_get_buffer function in libavcodec/utils.c in FFmpeg before 2.8.4 preserves width and height values after a failure, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via a crafted .mov file.


Discovery 2015-12-20
Entry 2015-12-28
Modified 2018-03-25
libav
ge 0

gstreamer-ffmpeg
ge 0

handbrake
< 1.2.0

ffmpeg
ge 2.8,1 lt 2.8.4,1

< 2.7.4,1

ffmpeg26
< 2.6.6

ffmpeg25
< 2.5.9

ffmpeg24
< 2.4.12

ffmpeg-devel
ffmpeg23
ffmpeg2
ffmpeg1
ffmpeg-011
ffmpeg0
ge 0

avidemux
avidemux2
avidemux26
le 2.6.11

kodi
< 16.0

mplayer
mencoder
< 1.2.r20151219_1

mythtv
mythtv-frontend
le 0.27.5,1

plexhometheater
ge 0

CVE-2015-8662
CVE-2015-8663
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=75422280fbcdfbe9dc56bde5525b4d8b280f1bc5
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=abee0a1c60612e8638640a8a3738fffb65e16dbf
https://ffmpeg.org/security.html
b0da85af-21a3-4c15-a137-fe9e4bc86002ffmpeg -- multiple vulnerabilities

NVD reports:

The update_dimensions function in libavcodec/vp8.c in FFmpeg through 2.8.1, as used in Google Chrome before 46.0.2490.71 and other products, relies on a coefficient-partition count during multi-threaded operation, which allows remote attackers to cause a denial of service (race condition and memory corruption) or possibly have unspecified other impact via a crafted WebM file.

The ljpeg_decode_yuv_scan function in libavcodec/mjpegdec.c in FFmpeg before 2.8.2 omits certain width and height checks, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted MJPEG data.

The ff_hevc_parse_sps function in libavcodec/hevc_ps.c in FFmpeg before 2.8.2 does not validate the Chroma Format Indicator, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted High Efficiency Video Coding (HEVC) data.

The decode_uncompressed function in libavcodec/faxcompr.c in FFmpeg before 2.8.2 does not validate uncompressed runs, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted CCITT FAX data.

The init_tile function in libavcodec/jpeg2000dec.c in FFmpeg before 2.8.2 does not enforce minimum-value and maximum-value constraints on tile coordinates, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JPEG 2000 data.

The jpeg2000_read_main_headers function in libavcodec/jpeg2000dec.c in FFmpeg before 2.6.5, 2.7.x before 2.7.3, and 2.8.x through 2.8.2 does not enforce uniqueness of the SIZ marker in a JPEG 2000 image, which allows remote attackers to cause a denial of service (out-of-bounds heap-memory access) or possibly have unspecified other impact via a crafted image with two or more of these markers.

Integer overflow in the ff_ivi_init_planes function in libavcodec/ivi.c in FFmpeg before 2.6.5, 2.7.x before 2.7.3, and 2.8.x through 2.8.2 allows remote attackers to cause a denial of service (out-of-bounds heap-memory access) or possibly have unspecified other impact via crafted image dimensions in Indeo Video Interactive data.

The smka_decode_frame function in libavcodec/smacker.c in FFmpeg before 2.6.5, 2.7.x before 2.7.3, and 2.8.x through 2.8.2 does not verify that the data size is consistent with the number of channels, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Smacker data.


Discovery 2015-11-27
Entry 2015-12-02
Modified 2018-03-25
libav
ge 0

gstreamer-ffmpeg
ge 0

handbrake
< 1.2.0

ffmpeg
ge 2.8,1 lt 2.8.3,1

< 2.7.3,1

ffmpeg26
< 2.6.5

ffmpeg25
< 2.5.9

ffmpeg24
< 2.4.12

ffmpeg-devel
ffmpeg23
ffmpeg2
ffmpeg1
ffmpeg-011
ffmpeg0
ge 0

avidemux
avidemux2
avidemux26
le 2.6.11

kodi
< 16.0

mplayer
mencoder
< 1.1.r20150822_7

mythtv
mythtv-frontend
le 0.27.5,1

plexhometheater
ge 0

CVE-2015-6761
CVE-2015-8216
CVE-2015-8217
CVE-2015-8218
CVE-2015-8219
CVE-2015-8363
CVE-2015-8364
CVE-2015-8365
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=dabea74d0e82ea80cd344f630497cafcb3ef872c
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=d24888ef19ba38b787b11d1ee091a3d94920c76a
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=93f30f825c08477fe8f76be00539e96014cc83c8
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=d4a731b84a08f0f3839eaaaf82e97d8d9c67da46
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=43492ff3ab68a343c1264801baa1d5a02de10167
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=44a7f17d0b20e6f8d836b2957e3e357b639f19a2
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=df91aa034b82b77a3c4e01791f4a2b2ff6c82066
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=4a9af07a49295e014b059c1ab624c40345af5892
https://ffmpeg.org/security.html
046fedd1-bd01-11e5-bbf4-5404a68ad561ffmpeg -- remote attacker can access local files

Arch Linux reports:

ffmpeg has a vulnerability in the current version that allows the attacker to create a specially crafted video file, downloading which will send files from a user PC to a remote attacker server. The attack does not even require the user to open that file — for example, KDE Dolphin thumbnail generation is enough.


Discovery 2016-01-13
Entry 2016-01-17
ffmpeg
gt 2.0,1 lt 2.8.5,1

mplayer
mencoder
< 1.2.r20151219_2

CVE-2016-1897
CVE-2016-1898
ports/206282
https://www.ffmpeg.org/security.html
7f9b696f-f11b-11e6-b50e-5404a68ad561ffmpeg -- heap overflow in lavf/mov.c

FFmpeg security reports:

FFmpeg 3.2.4 fixes the following vulnerabilities: CVE-2017-5024, CVE-2017-5025


Discovery 2017-01-25
Entry 2017-02-12
Modified 2018-03-25
ffmpeg
< 3.2.4,1

mythtv
mythtv-frontend
< 29.1,1

CVE-2017-5024
https://www.ffmpeg.org/security.html
https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html
CVE-2017-5025
https://www.ffmpeg.org/security.html
https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html
5ccbb2f8-c798-11e7-a633-009c02a2ab30ffmpeg -- multiple vulnerabilities

MITRE reports:

Multiple vulnerabilities have been found in FFmpeg. Please refer to CVE list for details.

Note: CVE-2017-15186 and CVE-2017-15672 affect only the 3.3 branch before 3.3.5, CVE-2017-16840 and CVE-2017-17081 have been fixed in 3.4.1. They're listed here for completeness of the record.


Discovery 2017-10-09
Entry 2018-07-27
ffmpeg
< 3.3.5_1,1

ge 3.4,1 le 3.4.1_4,1

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15186
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15672
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6392
http://ffmpeg.org/security.html
CVE-2017-15186
CVE-2017-15672
CVE-2017-16840
CVE-2017-17081
CVE-2018-6392