A use-after-free vulnerability in the palette reduction code has been discovered in the versions 0.7, 0.7.1 and 0.7.2. Fix: - Update to 0.7.4 - Add VuXML entry - Trim header - Add LICENSE Patch attached with submission follows:
Maintainer of graphics/optipng, Please note that PR ports/177206 has just been submitted. If it contains a patch for an upgrade, an enhancement or a bug fix you agree on, reply to this email stating that you approve the patch and a committer will take care of it. The full text of the PR can be found at: http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/177206 -- Edwin Groothuis via the GNATS Auto Assign Tool edwin@FreeBSD.org
State Changed From-To: open->feedback Awaiting maintainers feedback (via the GNATS Auto Assign Tool)
Author: zi Date: Tue Mar 26 01:13:34 2013 New Revision: 315254 URL: http://svnweb.freebsd.org/changeset/ports/315254 Log: - Document vulnerability in graphics/optipng (CVE-2012-4432) PR: ports/177206 Submitted by: Alexander Milanov <a@amilanov.com> Security: 8818f7f-9182-11e2-9bdf-d48564727302 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Mar 26 01:08:40 2013 (r315253) +++ head/security/vuxml/vuln.xml Tue Mar 26 01:13:34 2013 (r315254) @@ -51,6 +51,38 @@ Note: Please add new entries to the beg --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="a8818f7f-9182-11e2-9bdf-d48564727302"> + <topic>optipng -- use-after-free vulnerability</topic> + <affects> + <package> + <name>optipng</name> + <range><ge>0.7</ge><lt>0.7.4</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Secunia reports:</p> + <blockquote cite="https://secunia.com/advisories/50654"> + <p>A vulnerability has been reported in OptiPNG, which can be + exploited by malicious people to potentially compromise a user's + system.</p> + <p>The vulnerability is caused due to a use-after-free error related + to the palette reduction functionality. No further information is + currently available.</p> + <p>Success exploitation may allow execution of arbitrary code.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2012-4432</cvename> + <url>https://secunia.com/advisories/50654</url> + </references> + <dates> + <discovery>2012-09-16</discovery> + <entry>2013-03-21</entry> + </dates> + </vuln> + <vuln vid="1d23109a-9005-11e2-9602-d43d7e0c7c02"> <topic>php5 -- Multiple vulnerabilities</topic> <affects> _______________________________________________ svn-ports-all@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/svn-ports-all To unsubscribe, send any mail to "svn-ports-all-unsubscribe@freebsd.org"
Patch looks good, tested fine. Please commit, thanks :) Sorry for the delay, my email filtering seems to be a bit fascist. Will fix. -- Thomas 'Freaky' Hurst http://hur.st/
State Changed From-To: feedback->open Maintainer approved.
Author: rakuco Date: Sat May 18 20:35:07 2013 New Revision: 318453 URL: http://svnweb.freebsd.org/changeset/ports/318453 Log: - Update to 0.7.4 - Add VuXML entry - Trim Makefile header - Add LICENSE PR: ports/177206 Submitted by: Alexander Milanov <a@amilanov.com> Approved by: Thomas Hurst <tom@hur.st> (maintainer) Security: a8818f7f-9182-11e2-9bdf-d48564727302 Modified: head/graphics/optipng/Makefile head/graphics/optipng/distinfo head/security/vuxml/vuln.xml Modified: head/graphics/optipng/Makefile ============================================================================== --- head/graphics/optipng/Makefile Sat May 18 20:34:41 2013 (r318452) +++ head/graphics/optipng/Makefile Sat May 18 20:35:07 2013 (r318453) @@ -1,18 +1,17 @@ -# New ports collection makefile for: optipng -# Date created: 09 July 2003 -# Whom: Thomas Hurst <freaky@aagh.net> -# +# Created by: Thomas Hurst <freaky@aagh.net> # $FreeBSD$ -# PORTNAME= optipng -PORTVERSION= 0.7.1 +PORTVERSION= 0.7.4 CATEGORIES= graphics MASTER_SITES= SF/${PORTNAME}/OptiPNG/${PORTNAME}-${PORTVERSION} MAINTAINER= tom@hur.st COMMENT= An optimizer for PNG files +LICENSE= ZLIB +LICENSE_FILE= ${WRKSRC}/LICENSE.txt + OPTIONS_DEFINE= BUNDLED_LIBPNG BUNDLED_ZLIB BUNDLED_LIBPNG_DESC= Use bundled libpng Modified: head/graphics/optipng/distinfo ============================================================================== --- head/graphics/optipng/distinfo Sat May 18 20:34:41 2013 (r318452) +++ head/graphics/optipng/distinfo Sat May 18 20:35:07 2013 (r318453) @@ -1,2 +1,2 @@ -SHA256 (optipng-0.7.1.tar.gz) = 6d28cd194729f6c806df24cb604355f27c4badd4457fffcbeeca23d9b6106b76 -SIZE (optipng-0.7.1.tar.gz) = 1608280 +SHA256 (optipng-0.7.4.tar.gz) = 520b5d5a9405dbdc5c905dd0cff87211e69c4ed2059744037510e613fe8237ff +SIZE (optipng-0.7.4.tar.gz) = 1613916 Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sat May 18 20:34:41 2013 (r318452) +++ head/security/vuxml/vuln.xml Sat May 18 20:35:07 2013 (r318453) @@ -51,6 +51,38 @@ Note: Please add new entries to the beg --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="a8818f7f-9182-11e2-9bdf-d48564727302"> + <topic>optipng -- use-after-free vulnerability</topic> + <affects> + <package> + <name>optipng</name> + <range><ge>0.7</ge><lt>0.7.4</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Secunia reports:</p> + <blockquote cite="https://secunia.com/advisories/50654"> + <p>A vulnerability has been reported in OptiPNG, which can be + exploited by malicious people to potentially compromise a user's + system.</p> + <p>The vulnerability is caused due to a use-after-free error related + to the palette reduction functionality. No further information is + currently available.</p> + <p>Success exploitation may allow execution of arbitrary code.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2012-4432</cvename> + <url>https://secunia.com/advisories/50654</url> + </references> + <dates> + <discovery>2012-09-16</discovery> + <entry>2015-05-18</entry> + </dates> + </vuln> + <vuln vid="a0c65049-bddd-11e2-a0f6-001060e06fd4"> <topic>linux-flashplugin -- multiple vulnerabilities</topic> <affects> _______________________________________________ svn-ports-all@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/svn-ports-all To unsubscribe, send any mail to "svn-ports-all-unsubscribe@freebsd.org"
State Changed From-To: open->closed Committed. Thanks!