diff options
author | feld <feld@FreeBSD.org> | 2016-02-27 00:16:21 +0800 |
---|---|---|
committer | feld <feld@FreeBSD.org> | 2016-02-27 00:16:21 +0800 |
commit | f4b624ff71604a8f77260ba8e9037f5e4d6b0fa8 (patch) | |
tree | fa157b93a15db664aceba2bd63e8864eda68b232 | |
parent | 78744fa84a90b8ee92f016d60b9f5d523487a64a (diff) | |
download | freebsd-ports-gnome-f4b624ff71604a8f77260ba8e9037f5e4d6b0fa8.tar.gz freebsd-ports-gnome-f4b624ff71604a8f77260ba8e9037f5e4d6b0fa8.tar.zst freebsd-ports-gnome-f4b624ff71604a8f77260ba8e9037f5e4d6b0fa8.zip |
Document multimedia/pitivi vulnerability
Security: CVE-2015-0855
-rw-r--r-- | security/vuxml/vuln.xml | 29 |
1 files changed, 29 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 54cb8cef2e95..385a8f5029d2 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,35 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="6540c8f0-dca3-11e5-8fa8-14dae9d210b8"> + <topic>pitivi -- code execution</topic> + <affects> + <package> + <name>pitivi</name> + <range><lt>0.95</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Luke Farone reports:</p> + <blockquote cite="http://www.openwall.com/lists/oss-security/2015/12/23/8"> + <p>Double-clicking a file in the user's media library with a + specially-crafted path or filename allows for arbitrary code execution + with the permissions of the user running Pitivi.</p> + </blockquote> + </body> + </description> + <references> + <url>http://www.openwall.com/lists/oss-security/2015/12/23/8</url> + <url>https://git.gnome.org/browse/pitivi/commit/?id=45a4c84edb3b4343f199bba1c65502e3f49f5bb2</url> + <cvename>CVE-2015-0855</cvename> + </references> + <dates> + <discovery>2015-09-13</discovery> + <entry>2016-02-26</entry> + </dates> + </vuln> + <vuln vid="90c8385a-dc9f-11e5-8fa8-14dae9d210b8"> <topic>giflib -- heap overflow</topic> <affects> |