aboutsummaryrefslogtreecommitdiffstats
path: root/community/libcroco/CVE-2017-8871-and-CVE-2017-8834.patch
diff options
context:
space:
mode:
Diffstat (limited to 'community/libcroco/CVE-2017-8871-and-CVE-2017-8834.patch')
-rw-r--r--community/libcroco/CVE-2017-8871-and-CVE-2017-8834.patch29
1 files changed, 29 insertions, 0 deletions
diff --git a/community/libcroco/CVE-2017-8871-and-CVE-2017-8834.patch b/community/libcroco/CVE-2017-8871-and-CVE-2017-8834.patch
new file mode 100644
index 0000000000..f65c6a9748
--- /dev/null
+++ b/community/libcroco/CVE-2017-8871-and-CVE-2017-8834.patch
@@ -0,0 +1,29 @@
+From deda38539f5b25616aa294d8b19d33ebf8e175ff Mon Sep 17 00:00:00 2001
+From: Mike Gorse <mgorse@alum.wpi.edu>
+Date: Thu, 2 May 2019 10:54:43 -0500
+Subject: [PATCH] cr_utils_read_char_from_utf8_buf: move past invalid UTF-8
+
+Otherwise, the offending character is never consumed, possibly leading
+to an infinite loop.
+
+https://bugzilla.gnome.org/show_bug.cgi?id=782647
+---
+ src/cr-utils.c | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/src/cr-utils.c b/src/cr-utils.c
+index 2420cec..6cf4849 100644
+--- a/src/cr-utils.c
++++ b/src/cr-utils.c
+@@ -505,6 +505,7 @@ cr_utils_read_char_from_utf8_buf (const guchar * a_in,
+
+ } else {
+ /*BAD ENCODING */
++ nb_bytes_2_decode = 1;
+ goto end;
+ }
+
+--
+2.20.1
+
+