Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 26 Mar 2013 01:20:00 GMT
From:      dfilter@FreeBSD.ORG (dfilter service)
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   Re: ports/177206: commit references a PR
Message-ID:  <201303260120.r2Q1K0fk076498@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help
The following reply was made to PR ports/177206; it has been noted by GNATS.

From: dfilter@FreeBSD.ORG (dfilter service)
To: bug-followup@FreeBSD.org
Cc:  
Subject: Re: ports/177206: commit references a PR
Date: Tue, 26 Mar 2013 01:13:42 +0000 (UTC)

 Author: zi
 Date: Tue Mar 26 01:13:34 2013
 New Revision: 315254
 URL: http://svnweb.freebsd.org/changeset/ports/315254
 
 Log:
   - Document vulnerability in graphics/optipng (CVE-2012-4432)
   
   PR:		ports/177206
   Submitted by:	Alexander Milanov <a@amilanov.com>
   Security:	8818f7f-9182-11e2-9bdf-d48564727302
 
 Modified:
   head/security/vuxml/vuln.xml
 
 Modified: head/security/vuxml/vuln.xml
 ==============================================================================
 --- head/security/vuxml/vuln.xml	Tue Mar 26 01:08:40 2013	(r315253)
 +++ head/security/vuxml/vuln.xml	Tue Mar 26 01:13:34 2013	(r315254)
 @@ -51,6 +51,38 @@ Note:  Please add new entries to the beg
  
  -->
  <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
 +  <vuln vid="a8818f7f-9182-11e2-9bdf-d48564727302">
 +    <topic>optipng -- use-after-free vulnerability</topic>
 +    <affects>
 +      <package>
 +        <name>optipng</name>
 +        <range><ge>0.7</ge><lt>0.7.4</lt></range>
 +      </package>
 +    </affects>
 +    <description>
 +      <body xmlns="http://www.w3.org/1999/xhtml">;
 +        <p>Secunia reports:</p>
 +        <blockquote cite="https://secunia.com/advisories/50654">;
 +          <p>A vulnerability has been reported in OptiPNG, which can be
 +             exploited by malicious people to potentially compromise a user's
 +             system.</p>
 +          <p>The vulnerability is caused due to a use-after-free error related
 +             to the palette reduction functionality. No further information is
 +             currently available.</p>
 +          <p>Success exploitation may allow execution of arbitrary code.</p>
 +        </blockquote>
 +      </body>
 +    </description>
 +    <references>
 +      <cvename>CVE-2012-4432</cvename>
 +      <url>https://secunia.com/advisories/50654</url>;
 +    </references>
 +    <dates>
 +      <discovery>2012-09-16</discovery>
 +      <entry>2013-03-21</entry>
 +    </dates>
 +  </vuln>
 +
    <vuln vid="1d23109a-9005-11e2-9602-d43d7e0c7c02">
      <topic>php5 -- Multiple vulnerabilities</topic>
      <affects>
 _______________________________________________
 svn-ports-all@freebsd.org mailing list
 http://lists.freebsd.org/mailman/listinfo/svn-ports-all
 To unsubscribe, send any mail to "svn-ports-all-unsubscribe@freebsd.org"
 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201303260120.r2Q1K0fk076498>