| Summary: | cairo new security issue CVE-2019-6462 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | andrewsfarm, davidwhodgins, herman.viaene, nicolas.salguero, sysadmin-bugs |
| Version: | 8 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA8-64-OK | ||
| Source RPM: | cairo-1.16.0-6.mga8.src.rpm | CVE: | CVE-2019-6462 |
| Status comment: | |||
|
Description
David Walser
2021-10-23 15:36:00 CEST
David Walser
2021-10-23 15:36:14 CEST
Status comment:
(none) =>
Patch available from upstream No registered nor evident maintainer, so have to assign this globally. Assignee:
bugsquad =>
pkg-bugs Suggested advisory: ======================== The updated packages fix a security vulnerability: An issue was discovered in cairo 1.16.0. There is an infinite loop in the function _arc_error_normalized in the file cairo-arc.c, related to _arc_max_angle_for_tolerance_normalized. (CVE-2019-6462) References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462 https://lists.suse.com/pipermail/sle-security-updates/2021-October/009644.html ======================== Updated packages in core/updates_testing: ======================== lib(64)cairo2-1.16.0-6.1.mga8 lib(64)cairo-devel-1.16.0-6.1.mga8 lib(64)cairo-static-devel-1.16.0-6.1.mga8 from SRPM: cairo-1.16.0-6.1.mga8.src.rpm Status:
NEW =>
ASSIGNED MGA8-64 Plasma on Lenovo B50 No installation issues. As stated in bug 28084, # urpmq --whatrequires lib64cairo2 returns a long list picked out caja and run strace -o libcairo.txt caja and checked and found references to libcairo lob files. Works OK. Whiteboard:
(none) =>
MGA8-64-OK Validating. Advisory in Comment 2. Keywords:
(none) =>
validated_update
Dave Hodgins
2021-10-29 18:38:16 CEST
Keywords:
(none) =>
advisory An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2021-0497.html Status:
ASSIGNED =>
RESOLVED |