Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 21 Mar 2013 16:33:30 GMT
From:      Alexander Milanov <a@amilanov.com>
To:        freebsd-gnats-submit@FreeBSD.org
Subject:   ports/177206: [patch] graphics/optipng: update to 0.7.4 and fix CVE-2012-4432
Message-ID:  <201303211633.r2LGXULZ036876@red.freebsd.org>
Resent-Message-ID: <201303211640.r2LGe3gG018099@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         177206
>Category:       ports
>Synopsis:       [patch] graphics/optipng: update to 0.7.4 and fix CVE-2012-4432
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Thu Mar 21 16:40:02 UTC 2013
>Closed-Date:
>Last-Modified:
>Originator:     Alexander Milanov
>Release:        9.1-RELEASE
>Organization:
>Environment:
FreeBSD t1 9.1-RELEASE FreeBSD 9.1-RELEASE #0 r243826: Tue Dec  4 06:55:39 UTC 2012     root@obrian.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC  i386
>Description:
A use-after-free vulnerability in the palette reduction code has been discovered in the versions 0.7, 0.7.1 and 0.7.2.
>How-To-Repeat:

>Fix:
- Update to 0.7.4
- Add VuXML entry

- Trim header
- Add LICENSE

Patch attached with submission follows:

Index: graphics/optipng/Makefile
===================================================================
--- graphics/optipng/Makefile	(revision 314842)
+++ graphics/optipng/Makefile	(working copy)
@@ -1,18 +1,17 @@
-# New ports collection makefile for:	optipng
-# Date created:				09 July 2003
-# Whom:					Thomas Hurst <freaky@aagh.net>
-#
+# Created by: Thomas Hurst <freaky@aagh.net>
 # $FreeBSD$
-#
 
 PORTNAME=	optipng
-PORTVERSION=	0.7.1
+PORTVERSION=	0.7.4
 CATEGORIES=	graphics
 MASTER_SITES=	SF/${PORTNAME}/OptiPNG/${PORTNAME}-${PORTVERSION}
 
 MAINTAINER=	tom@hur.st
 COMMENT=	An optimizer for PNG files
 
+LICENSE=	ZLIB
+LICENSE_FILE=	${WRKSRC}/LICENSE.txt
+
 OPTIONS_DEFINE=	BUNDLED_LIBPNG BUNDLED_ZLIB
 
 BUNDLED_LIBPNG_DESC=	Use bundled libpng
Index: graphics/optipng/distinfo
===================================================================
--- graphics/optipng/distinfo	(revision 314842)
+++ graphics/optipng/distinfo	(working copy)
@@ -1,2 +1,2 @@
-SHA256 (optipng-0.7.1.tar.gz) = 6d28cd194729f6c806df24cb604355f27c4badd4457fffcbeeca23d9b6106b76
-SIZE (optipng-0.7.1.tar.gz) = 1608280
+SHA256 (optipng-0.7.4.tar.gz) = 520b5d5a9405dbdc5c905dd0cff87211e69c4ed2059744037510e613fe8237ff
+SIZE (optipng-0.7.4.tar.gz) = 1613916
Index: security/vuxml/vuln.xml
===================================================================
--- security/vuxml/vuln.xml	(revision 314842)
+++ security/vuxml/vuln.xml	(working copy)
@@ -51,6 +51,38 @@
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="a8818f7f-9182-11e2-9bdf-d48564727302">
+    <topic>optipng -- use-after-free vulnerability</topic>
+    <affects>
+      <package>
+        <name>optipng</name>
+        <range><ge>0.7</ge><lt>0.7.4</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+        <p>Secunia reports:</p>
+        <blockquote cite="https://secunia.com/advisories/50654">;
+          <p>A vulnerability has been reported in OptiPNG, which can be
+            exploited by malicious people to potentially compromise a user's
+            system.</p>
+          <p>The vulnerability is caused due to a use-after-free error related
+            to the palette reduction functionality. No further information is
+            currently available.</p>
+          <p>Success exploitation may allow execution of arbitrary code.</p>
+        </blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2012-4432</cvename>
+      <url>https://secunia.com/advisories/50654</url>;
+    </references>
+    <dates>
+      <discovery>2012-09-16</discovery>
+      <entry>2013-03-21</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="1d23109a-9005-11e2-9602-d43d7e0c7c02">
     <topic>php5 -- Multiple vulnerabilities</topic>
     <affects>


>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201303211633.r2LGXULZ036876>