FS#70017 - [cairo] [lib32-cairo] [Security] arbitrary code execution (CVE-2020-35492)
Attached to Project:
Arch Linux
Opened by Jonas Witschel (diabonas) - Tuesday, 16 March 2021, 15:39 GMT
Last edited by Jan Alexander Steffens (heftig) - Tuesday, 16 March 2021, 21:15 GMT
Opened by Jonas Witschel (diabonas) - Tuesday, 16 March 2021, 15:39 GMT
Last edited by Jan Alexander Steffens (heftig) - Tuesday, 16 March 2021, 21:15 GMT
|
Details
Summary
======= The packages cairo and lib32-cairo are vulnerable to arbitrary code execution via CVE-2020-35492. Guidance ======== Cherry-picking commit 03a820b173ed1fdef6ff14b4468f5dbc02ff59be referenced below fixes the issue. References ========== https://security.archlinux.org/AVG-1391 https://bugzilla.redhat.com/show_bug.cgi?id=1898396 https://gitlab.freedesktop.org/cairo/cairo/-/issues/437 https://gitlab.freedesktop.org/cairo/cairo/uploads/70783d7cd4183eb250dfd124c1c15e9b/crash.odp https://gitlab.freedesktop.org/cairo/cairo/-/merge_requests/85 https://gitlab.freedesktop.org/cairo/cairo/-/commit/03a820b173ed1fdef6ff14b4468f5dbc02ff59be |
This task depends upon
Closed by Jan Alexander Steffens (heftig)
Tuesday, 16 March 2021, 21:15 GMT
Reason for closing: Fixed
Additional comments about closing: 1.17.4-5
Tuesday, 16 March 2021, 21:15 GMT
Reason for closing: Fixed
Additional comments about closing: 1.17.4-5