Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 4 Aug 2016 14:49:49 +0000 (UTC)
From:      Mark Felder <feld@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r419621 - head/security/vuxml
Message-ID:  <201608041449.u74EnnXi067724@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: feld
Date: Thu Aug  4 14:49:48 2016
New Revision: 419621
URL: https://svnweb.freebsd.org/changeset/ports/419621

Log:
  Document gd vulnerabilities
  
  PR:		211562

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Thu Aug  4 14:49:06 2016	(r419620)
+++ head/security/vuxml/vuln.xml	Thu Aug  4 14:49:48 2016	(r419621)
@@ -58,6 +58,44 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="556d2286-5a51-11e6-a6c3-14dae9d210b8">
+    <topic>gd -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>gd</name>
+	<range><lt>2.2.3,1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Pierre Joye reports:</p>
+	<blockquote cite="https://github.com/libgd/libgd/releases/tag/gd-2.2.3">;
+	  <ul>
+	  <li><p>fix php bug 72339, Integer Overflow in _gd2GetHeader
+	    (CVE-2016-5766)</p></li>
+	  <li><p>gd: Buffer over-read issue when parsing crafted TGA
+	    file (CVE-2016-6132)</p></li>
+	  <li><p>Integer overflow error within _gdContributionsAlloc()
+	    (CVE-2016-6207)</p></li>
+	  <li><p>fix php bug 72494, invalid color index not handled, can
+	    lead to crash ( CVE-2016-6128)</p></li>
+	  </ul>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://github.com/libgd/libgd/releases/tag/gd-2.2.3</url>;
+      <cvename>CVE-2016-5766</cvename>
+      <cvename>CVE-2016-6132</cvename>
+      <cvename>CVE-2016-6207</cvename>
+      <cvename>CVE-2016-6128</cvename>
+    </references>
+    <dates>
+      <discovery>2016-07-21</discovery>
+      <entry>2016-08-04</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="e4bc70fc-5a2f-11e6-a1bc-589cfc0654e1">
     <topic>Vulnerabilities in Curl</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201608041449.u74EnnXi067724>