Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 17 Mar 2016 13:29:37 -0300
From: Gustavo Grieco <gustavo.grieco@...il.com>
To: oss-security@...ts.openwall.com
Subject: [cairo] Out-of-bounds read in _fill_xrgb32_lerp_opaque_spans

Hi,

There is an out-of-bounds read in _fill_xrgb32_lerp_opaque_spans in cairo
(crashing software that parses and renderizes a svg, for instance).
Fortunately, this vulnerability was fixed in the 1.14.2 release (
https://mail.gnome.org/archives/gnome-announce-list/2015-March/msg00047.html).
The patch is available here:

https://cgit.freedesktop.org/cairo/patch/src/cairo-image-compositor.c?id=5c82d91a5e15d29b1489dcb413b24ee7fdf59934

Please assign a CVE to this issue.

Regards,
Gus.

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.