diff options
author | Mart Raudsepp <leio@gentoo.org> | 2019-08-15 14:30:15 +0300 |
---|---|---|
committer | Mart Raudsepp <leio@gentoo.org> | 2019-08-15 14:35:56 +0300 |
commit | 39892b09bb0b45155d545c6fd9fec43a99ca4ecc (patch) | |
tree | e6e7aaefac3df2425bec1f9018d76577aafcd936 /x11-libs/pango/files | |
parent | dev-python/pypy3-bin: Rebuild no-sse2 x86 package (diff) | |
download | gentoo-39892b09bb0b45155d545c6fd9fec43a99ca4ecc.tar.gz gentoo-39892b09bb0b45155d545c6fd9fec43a99ca4ecc.tar.bz2 gentoo-39892b09bb0b45155d545c6fd9fec43a99ca4ecc.zip |
x11-libs/pango: fix CVE-2019-1010238
Bug: https://bugs.gentoo.org/692110
Package-Manager: Portage-2.3.62, Repoman-2.3.12
Signed-off-by: Mart Raudsepp <leio@gentoo.org>
Diffstat (limited to 'x11-libs/pango/files')
-rw-r--r-- | x11-libs/pango/files/1.42.4-CVE-2019-1010238.patch | 34 |
1 files changed, 34 insertions, 0 deletions
diff --git a/x11-libs/pango/files/1.42.4-CVE-2019-1010238.patch b/x11-libs/pango/files/1.42.4-CVE-2019-1010238.patch new file mode 100644 index 000000000000..eaf0784c1b31 --- /dev/null +++ b/x11-libs/pango/files/1.42.4-CVE-2019-1010238.patch @@ -0,0 +1,34 @@ +From 490f8979a260c16b1df055eab386345da18a2d54 Mon Sep 17 00:00:00 2001 +From: Matthias Clasen <mclasen@redhat.com> +Date: Wed, 10 Jul 2019 20:26:23 -0400 +Subject: [PATCH] bidi: Be safer against bad input + +Don't run off the end of an array that we +allocated to certain length. + +Closes: https://gitlab.gnome.org/GNOME/pango/issues/342 +--- + pango/pango-bidi-type.c | 7 +++++-- + 1 file changed, 5 insertions(+), 2 deletions(-) + +diff --git a/pango/pango-bidi-type.c b/pango/pango-bidi-type.c +index 3e46b66c..5c02dbbb 100644 +--- a/pango/pango-bidi-type.c ++++ b/pango/pango-bidi-type.c +@@ -181,8 +181,11 @@ pango_log2vis_get_embedding_levels (const gchar *text, + for (i = 0, p = text; p < text + length; p = g_utf8_next_char(p), i++) + { + gunichar ch = g_utf8_get_char (p); +- FriBidiCharType char_type; +- char_type = fribidi_get_bidi_type (ch); ++ FriBidiCharType char_type = fribidi_get_bidi_type (ch); ++ ++ if (i == n_chars) ++ break; ++ + bidi_types[i] = char_type; + ored_types |= char_type; + if (FRIBIDI_IS_STRONG (char_type)) +-- +2.21.0 + |