Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 28 Jan 2021 12:51:17 +0000 (UTC)
From:      Lewis Cook <lcook@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r563133 - head/security/vuxml
Message-ID:  <202101281251.10SCpHh7048959@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: lcook
Date: Thu Jan 28 12:51:16 2021
New Revision: 563133
URL: https://svnweb.freebsd.org/changeset/ports/563133

Log:
  security/vuxml: Document graphics/pngcheck vulnerability
  
  PR:			253019
  Approved by:		fernape (mentor)
  Differential Revision:	https://reviews.freebsd.org/D28308

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Thu Jan 28 12:47:48 2021	(r563132)
+++ head/security/vuxml/vuln.xml	Thu Jan 28 12:51:16 2021	(r563133)
@@ -77,6 +77,37 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="13ca36b8-6141-11eb-8a36-7085c2fb2c14">
+    <topic>pngcheck -- Buffer-overrun vulnerability</topic>
+    <affects>
+      <package>
+	<name>pngcheck</name>
+	<range><lt>3.0.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The libpng project reports:</p>
+	<blockquote cite="http://www.libpng.org/pub/png/apps/pngcheck.html">;
+	  <p>pngcheck versions 3.0.0 and earlier have a pair of buffer-overrun
+	    bugs related to the sPLT and PPLT chunks (the latter is a MNG-only
+	    chunk, but it gets noticed even in PNG files if the -s option is used).
+	    Both bugs are fixed in version 3.0.1, released on 24 January 2021.
+	    Again, while all known vulnerabilities are fixed in this version,
+	    the code is quite crufty, so it would be safest to assume there are
+	    still some problems hidden in there. As always, use at your own risk.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>http://www.libpng.org/pub/png/apps/pngcheck.html</url>;
+    </references>
+    <dates>
+      <discovery>2021-01-24</discovery>
+      <entry>2021-01-28</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="f3cf4b33-6013-11eb-9a0e-206a8a720317">
     <topic>sudo -- Multiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202101281251.10SCpHh7048959>