Bug 147163 - [PATCH] graphics/php4-gd: [Security fix for gd remote buffer overflow vulnerability]
Summary: [PATCH] graphics/php4-gd: [Security fix for gd remote buffer overflow vulnera...
Status: Closed FIXED
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: Normal Affects Only Me
Assignee: Alex Dupre
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2010-05-28 15:20 UTC by michael
Modified: 2010-06-14 15:50 UTC (History)
1 user (show)

See Also:


Attachments
php4-gd-4.4.9_3.patch (1.13 KB, patch)
2010-05-28 15:20 UTC, michael
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description michael 2010-05-28 15:20:01 UTC
Security fix for gd -- '_gdGetColors' remote buffer overflow vulnerability
Obsoletes ports/145060

Added file(s):
- files/patch-gd_gd.c

Port maintainer (ale@FreeBSD.org) is cc'd.

Generated with FreeBSD Port Tools 0.99
Comment 1 Edwin Groothuis freebsd_committer 2010-05-28 15:20:11 UTC
Responsible Changed
From-To: freebsd-ports-bugs->ale

Over to maintainer (via the GNATS Auto Assign Tool)
Comment 2 dfilter service freebsd_committer 2010-06-14 15:43:58 UTC
ale         2010-06-14 14:43:44 UTC

  FreeBSD ports repository

  Modified files:
    graphics/php4-gd     Makefile 
  Added files:
    graphics/php4-gd/files patch-libgd_gd_gd.c 
  Log:
  Security fix for gd remote buffer overflow vulnerability.
  
  PR:             ports/147163
  Submitted by:   Michael Ranner <michael@ranner.eu>
  
  Revision  Changes    Path
  1.2       +1 -0      ports/graphics/php4-gd/Makefile
  1.1       +12 -0     ports/graphics/php4-gd/files/patch-libgd_gd_gd.c (new)
_______________________________________________
cvs-all@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/cvs-all
To unsubscribe, send any mail to "cvs-all-unsubscribe@freebsd.org"
Comment 3 Alex Dupre freebsd_committer 2010-06-14 15:44:13 UTC
State Changed
From-To: open->closed

Committed, thanks!