Summary: | <x11-libs/cairo-1.16.0-r2: DoS attack based on using SVG to generate invalid pointers from a _cairo_image_surface in write_png (CVE-2016-9082) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | x11 |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugs.freedesktop.org/show_bug.cgi?id=98165 | ||
Whiteboard: | B3 [glsa+ cve] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 672908 | ||
Bug Blocks: |
Description
Agostino Sarubbo
![]() I think this is now CVE-2016-9082. Update: Even when the bug points to version 1.14.6, the error persists till actual version. There has been no update from upstream since last proposed patch, it is not a perfect solution, but it helps to avoid some of the problems. RedHat has already marked it as NONFIX and 703 packages from the tree depend on cairo. @Maintainers: could you let us know if the proposed patch could be applied here? thanks Upstream patch: https://cgit.freedesktop.org/cairo/commit/?id=38fbe621cf80d560cfc27b54b5417b62cda64c8a Upstream v1.15.10 or newer has this patch. This is fixed in 1.16.0 which is stable on all arches. No older versions remain in tree. This issue was resolved and addressed in GLSA 201904-01 at https://security.gentoo.org/glsa/201904-01 by GLSA coordinator Aaron Bauman (b-man). |