[Bug 227568] print/freetype2: Apply upstream fix for CVE-2018-6942 (v2.9)
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Tue Apr 17 01:42:21 UTC 2018
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=227568
Bug ID: 227568
Summary: print/freetype2: Apply upstream fix for CVE-2018-6942
(v2.9)
Product: Ports & Packages
Version: Latest
Hardware: Any
OS: Any
Status: New
Keywords: patch
Severity: Affects Some People
Priority: ---
Component: Individual Port(s)
Assignee: gnome at FreeBSD.org
Reporter: lightside at gmx.com
CC: gnome at FreeBSD.org, ports-secteam at FreeBSD.org
Flags: maintainer-feedback?(gnome at FreeBSD.org)
Assignee: gnome at FreeBSD.org
Attachment #192577 maintainer-approval?(gnome at FreeBSD.org)
Flags:
CC: gnome at FreeBSD.org
Created attachment 192577
--> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=192577&action=edit
Proposed patch (since 466285 revision)
Patch for print/freetype2 port with upstream fix for CVE-2018-6942:
"An issue was discovered in FreeType 2 through 2.9. A NULL pointer dereference
in the Ins_GETVARIATION() function within ttinterp.c could lead to DoS via a
crafted font file."
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=29c759284e305ec428703c9a5831d0b1fc3497ef
Based on message about CVE-2018-6942 in docs/CHANGES file:
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=632a11f91f0d932ac498e9e6ca022c9903ab05e9
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-ports-bugs
mailing list