* gnu/packages/gnome.scm (libcroco)[replacement]: New field. (libcroco/fixed): New variable. * gnu/packages/patches/libcroco-CVE-2017-7960.patch, gnu/packages/patches/libcroco-CVE-2017-7961.patch: New files. * gnu/local.mk (dist_patch_DATA): Add them.
		
			
				
	
	
		
			50 lines
		
	
	
	
		
			1.6 KiB
		
	
	
	
		
			Diff
		
	
	
	
	
	
			
		
		
	
	
			50 lines
		
	
	
	
		
			1.6 KiB
		
	
	
	
		
			Diff
		
	
	
	
	
	
| Fix CVE-2017-7961:
 | |
| 
 | |
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7961
 | |
| 
 | |
| Patch copied from upstream source repository:
 | |
| 
 | |
| https://git.gnome.org/browse/libcroco/commit/?id=9ad72875e9f08e4c519ef63d44cdbd94aa9504f7
 | |
| 
 | |
| From 9ad72875e9f08e4c519ef63d44cdbd94aa9504f7 Mon Sep 17 00:00:00 2001
 | |
| From: Ignacio Casal Quinteiro <qignacio@amazon.com>
 | |
| Date: Sun, 16 Apr 2017 13:56:09 +0200
 | |
| Subject: tknzr: support only max long rgb values
 | |
| 
 | |
| This fixes a possible out of bound when reading rgbs which
 | |
| are longer than the support MAXLONG
 | |
| ---
 | |
|  src/cr-tknzr.c | 10 ++++++++++
 | |
|  1 file changed, 10 insertions(+)
 | |
| 
 | |
| diff --git a/src/cr-tknzr.c b/src/cr-tknzr.c
 | |
| index 1a7cfeb..1548c35 100644
 | |
| --- a/src/cr-tknzr.c
 | |
| +++ b/src/cr-tknzr.c
 | |
| @@ -1279,6 +1279,11 @@ cr_tknzr_parse_rgb (CRTknzr * a_this, CRRgb ** a_rgb)
 | |
|          status = cr_tknzr_parse_num (a_this, &num);
 | |
|          ENSURE_PARSING_COND ((status == CR_OK) && (num != NULL));
 | |
|  
 | |
| +        if (num->val > G_MAXLONG) {
 | |
| +                status = CR_PARSING_ERROR;
 | |
| +                goto error;
 | |
| +        }
 | |
| +
 | |
|          red = num->val;
 | |
|          cr_num_destroy (num);
 | |
|          num = NULL;
 | |
| @@ -1298,6 +1303,11 @@ cr_tknzr_parse_rgb (CRTknzr * a_this, CRRgb ** a_rgb)
 | |
|                  status = cr_tknzr_parse_num (a_this, &num);
 | |
|                  ENSURE_PARSING_COND ((status == CR_OK) && (num != NULL));
 | |
|  
 | |
| +                if (num->val > G_MAXLONG) {
 | |
| +                        status = CR_PARSING_ERROR;
 | |
| +                        goto error;
 | |
| +                }
 | |
| +
 | |
|                  PEEK_BYTE (a_this, 1, &next_bytes[0]);
 | |
|                  if (next_bytes[0] == '%') {
 | |
|                          SKIP_CHARS (a_this, 1);
 | |
| -- 
 | |
| cgit v0.12
 | |
| 
 |