Date: Tue, 17 Apr 2018 01:42:18 +0000 From: bugzilla-noreply@freebsd.org To: gnome@FreeBSD.org Subject: maintainer-feedback requested: [Bug 227568] print/freetype2: Apply upstream fix for CVE-2018-6942 (v2.9) Message-ID: <bug-227568-6497-vF8Jdl3CcI@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-227568-6497@https.bugs.freebsd.org/bugzilla/> References: <bug-227568-6497@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
Bugzilla Automation <bugzilla@FreeBSD.org> has asked freebsd-gnome mailing = list <gnome@FreeBSD.org> for maintainer-feedback: Bug 227568: print/freetype2: Apply upstream fix for CVE-2018-6942 (v2.9) https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D227568 --- Description --- Patch for print/freetype2 port with upstream fix for CVE-2018-6942: "An issue was discovered in FreeType 2 through 2.9. A NULL pointer derefere= nce in the Ins_GETVARIATION() function within ttinterp.c could lead to DoS via a crafted font file." https://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2018-6942 https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3D29c75= 9284e3 05ec428703c9a5831d0b1fc3497ef Based on message about CVE-2018-6942 in docs/CHANGES file: http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3D632a11= f91f0d 932ac498e9e6ca022c9903ab05e9
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-227568-6497-vF8Jdl3CcI>