diff options
author | jhale <jhale@FreeBSD.org> | 2017-01-19 12:08:50 +0800 |
---|---|---|
committer | jhale <jhale@FreeBSD.org> | 2017-01-19 12:08:50 +0800 |
commit | 44e0fdc903366b2d09b0e322acc1932e738f839f (patch) | |
tree | 583240276540586fd7e54e9f1e45d73165f241b1 | |
parent | a3bba4c535d3a273f6dc755809a7ad14855165e4 (diff) | |
download | freebsd-ports-gnome-44e0fdc903366b2d09b0e322acc1932e738f839f.tar.gz freebsd-ports-gnome-44e0fdc903366b2d09b0e322acc1932e738f839f.tar.zst freebsd-ports-gnome-44e0fdc903366b2d09b0e322acc1932e738f839f.zip |
Document graphics/icoutils vulnerabilities
-rw-r--r-- | security/vuxml/vuln.xml | 30 |
1 files changed, 30 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 6214c742a84b..b4467d715a17 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,36 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="57facd35-ddf6-11e6-915d-001b3856973b"> + <topic>icoutils -- check_offset overflow on 64-bit systems</topic> + <affects> + <package> + <name>icoutils</name> + <range><lt>0.31.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Choongwoo Han reports:</p> + <blockquote cite="http://seclists.org/oss-sec/2017/q1/38"> + <p>An exploitable crash exists in the wrestool utility on 64-bit systems + where the result of subtracting two pointers exceeds the size of int.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2017-5208</cvename> + <cvename>CVE-2017-5331</cvename> + <cvename>CVE-2017-5332</cvename> + <cvename>CVE-2017-5333</cvename> + <url>http://seclists.org/oss-sec/2017/q1/38</url> + </references> + <dates> + <discovery>2017-01-03</discovery> + <entry>2017-01-19</entry> + </dates> + </vuln> + <vuln vid="4d2f9d09-ddb7-11e6-a9a5-b499baebfeaf"> <topic>mysql -- multiple vulnerabilities</topic> <affects> |