Date: Wed, 22 Jul 2015 12:01:47 +0000 (UTC) From: Koop Mast <kwm@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r392676 - head/security/vuxml Message-ID: <201507221201.t6MC1lfS019975@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: kwm Date: Wed Jul 22 12:01:46 2015 New Revision: 392676 URL: https://svnweb.freebsd.org/changeset/ports/392676 Log: Add gdk-pixbuf2 vulnability. Notified by: feld@ Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Wed Jul 22 11:55:19 2015 (r392675) +++ head/security/vuxml/vuln.xml Wed Jul 22 12:01:46 2015 (r392676) @@ -58,6 +58,32 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="95eee71d-3068-11e5-a9b5-bcaec565249c"> + <topic>gdk-pixbuf2 -- heap overflow and DoS affecting Firefox and other programs</topic> + <affects> + <package> + <name>gdk-pixbuf2</name> + <range><lt>2.31.2_2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>gustavo.grieco@imag.fr reports:</p> + <blockquote cite="https://bugzilla.gnome.org/show_bug.cgi?id=752297"> + <p>We found a heap overflow and a DoS in the gdk-pixbuf + implementation triggered by the scaling of a malformed bmp.</p> + </blockquote> + </body> + </description> + <references> + <url>https://bugzilla.gnome.org/show_bug.cgi?id=752297</url> + </references> + <dates> + <discovery>2015-07-12</discovery> + <entry>2015-07-22</entry> + </dates> + </vuln> + <vuln vid="8a1d0e63-1e07-11e5-b43d-002590263bf5"> <topic>pcre -- Heap Overflow Vulnerability in find_fixedlength()</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201507221201.t6MC1lfS019975>