Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 04 Oct 2023 14:50:27 +0000
From:      bugzilla-noreply@freebsd.org
To:        ports-bugs@FreeBSD.org
Subject:   [Bug 274265] x11/libXpm: update vulnerable port to 3.5.17
Message-ID:  <bug-274265-7788@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D274265

            Bug ID: 274265
           Summary: x11/libXpm: update vulnerable port to 3.5.17
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
               URL: https://lists.x.org/archives/xorg/2023-October/061507.
                    html
                OS: Any
            Status: New
          Severity: Affects Many People
          Priority: ---
         Component: Individual Port(s)
          Assignee: x11@FreeBSD.org
          Reporter: ps.ports@smyrak.com
          Assignee: x11@FreeBSD.org
                CC:
             Flags: maintainer-feedback?(x11@FreeBSD.org)

Created attachment 245435
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D245435&action=
=3Dedit
patch for x11/libXpm

X11 has published a security bulletin [1] that exposes the following CVEs in
our x11/libXpm version 3.5.15:

CVE-2023-43786: stack exhaustion in XPutImage
CVE-2023-43787: integer overflow in XCreateImage
CVE-2023-43788: Out of bounds read in XpmCreateXpmImageFromBuffer
CVE-2023-43789: Out of bounds read on XPM with corrupted colormap

See changelog for a full list of changes in the release [2].

The attached patch bumps the Makefile and distinfo.

1. https://lists.x.org/archives/xorg/2023-October/061506.html
2.
https://gitlab.freedesktop.org/xorg/lib/libxpm/-/compare/libXpm-3.5.15...li=
bXpm-3.5.17

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-274265-7788>