ports/177206: [patch] graphics/optipng: update to 0.7.4 and fix CVE-2012-4432
Alexander Milanov
a at amilanov.com
Thu Mar 21 16:40:03 UTC 2013
>Number: 177206
>Category: ports
>Synopsis: [patch] graphics/optipng: update to 0.7.4 and fix CVE-2012-4432
>Confidential: no
>Severity: non-critical
>Priority: low
>Responsible: freebsd-ports-bugs
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: change-request
>Submitter-Id: current-users
>Arrival-Date: Thu Mar 21 16:40:02 UTC 2013
>Closed-Date:
>Last-Modified:
>Originator: Alexander Milanov
>Release: 9.1-RELEASE
>Organization:
>Environment:
FreeBSD t1 9.1-RELEASE FreeBSD 9.1-RELEASE #0 r243826: Tue Dec 4 06:55:39 UTC 2012 root at obrian.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC i386
>Description:
A use-after-free vulnerability in the palette reduction code has been discovered in the versions 0.7, 0.7.1 and 0.7.2.
>How-To-Repeat:
>Fix:
- Update to 0.7.4
- Add VuXML entry
- Trim header
- Add LICENSE
Patch attached with submission follows:
Index: graphics/optipng/Makefile
===================================================================
--- graphics/optipng/Makefile (revision 314842)
+++ graphics/optipng/Makefile (working copy)
@@ -1,18 +1,17 @@
-# New ports collection makefile for: optipng
-# Date created: 09 July 2003
-# Whom: Thomas Hurst <freaky at aagh.net>
-#
+# Created by: Thomas Hurst <freaky at aagh.net>
# $FreeBSD$
-#
PORTNAME= optipng
-PORTVERSION= 0.7.1
+PORTVERSION= 0.7.4
CATEGORIES= graphics
MASTER_SITES= SF/${PORTNAME}/OptiPNG/${PORTNAME}-${PORTVERSION}
MAINTAINER= tom at hur.st
COMMENT= An optimizer for PNG files
+LICENSE= ZLIB
+LICENSE_FILE= ${WRKSRC}/LICENSE.txt
+
OPTIONS_DEFINE= BUNDLED_LIBPNG BUNDLED_ZLIB
BUNDLED_LIBPNG_DESC= Use bundled libpng
Index: graphics/optipng/distinfo
===================================================================
--- graphics/optipng/distinfo (revision 314842)
+++ graphics/optipng/distinfo (working copy)
@@ -1,2 +1,2 @@
-SHA256 (optipng-0.7.1.tar.gz) = 6d28cd194729f6c806df24cb604355f27c4badd4457fffcbeeca23d9b6106b76
-SIZE (optipng-0.7.1.tar.gz) = 1608280
+SHA256 (optipng-0.7.4.tar.gz) = 520b5d5a9405dbdc5c905dd0cff87211e69c4ed2059744037510e613fe8237ff
+SIZE (optipng-0.7.4.tar.gz) = 1613916
Index: security/vuxml/vuln.xml
===================================================================
--- security/vuxml/vuln.xml (revision 314842)
+++ security/vuxml/vuln.xml (working copy)
@@ -51,6 +51,38 @@
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="a8818f7f-9182-11e2-9bdf-d48564727302">
+ <topic>optipng -- use-after-free vulnerability</topic>
+ <affects>
+ <package>
+ <name>optipng</name>
+ <range><ge>0.7</ge><lt>0.7.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Secunia reports:</p>
+ <blockquote cite="https://secunia.com/advisories/50654">
+ <p>A vulnerability has been reported in OptiPNG, which can be
+ exploited by malicious people to potentially compromise a user's
+ system.</p>
+ <p>The vulnerability is caused due to a use-after-free error related
+ to the palette reduction functionality. No further information is
+ currently available.</p>
+ <p>Success exploitation may allow execution of arbitrary code.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2012-4432</cvename>
+ <url>https://secunia.com/advisories/50654</url>
+ </references>
+ <dates>
+ <discovery>2012-09-16</discovery>
+ <entry>2013-03-21</entry>
+ </dates>
+ </vuln>
+
<vuln vid="1d23109a-9005-11e2-9602-d43d7e0c7c02">
<topic>php5 -- Multiple vulnerabilities</topic>
<affects>
>Release-Note:
>Audit-Trail:
>Unformatted:
More information about the freebsd-ports-bugs
mailing list