On 2020-09-24 20:10, Tobias Kortkamp wrote:
On Thu, Jul 23, 2020, at 18:34, Jochen Neumeister wrote:
Author: joneum
Date: Thu Jul 23 18:34:50 2020
New Revision: 542951
URL: https://svnweb.freebsd.org/changeset/ports/542951

Log:
   SECURITY UPDATE: Buffer overflow
Gnome Pango 1.42 and later is affected by: Buffer Overflow. The
impact is: The heap based buffer overflow can be used to get code
execution. The component is: function name:
pango_log2vis_get_embedding_levels, assignment of nchars and the loop
condition. The attack vector is: Bug can be used when application pass
invalid utf-8 strings to functions like pango_itemize.
PR: 239563
   Reported by: Miyashita Touka <[email protected]>
   Approved by: gnome (maintainer timeout)
   MFH:         2020Q3
   Security:    456375e1-cd09-11ea-9172-4c72b94353b5
   Sponsored by:        Netzkommune GmbH

The port is still vulnerable: files/CVE-20191010238 has no 'patch-'
prefix so is never applied by the framework.  How did this pass
review?

This has been fixed in ports r550179, and VuXML has been updated with the actual version of pango where this got fixed.
Regards
--
Niclas Zeising
_______________________________________________
[email protected] mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-desktop
To unsubscribe, send any mail to "[email protected]"

Reply via email to