<html>
<head>
<base href="https://bugs.freedesktop.org/">
</head>
<body>
<p>
<div>
<b><a class="bz_bug_link
bz_status_NEW "
title="NEW - DoS attack based on using SVG to generate invalid pointers from a _cairo_image_surface in write_png"
href="https://bugs.freedesktop.org/show_bug.cgi?id=98165#c10">Comment # 10</a>
on <a class="bz_bug_link
bz_status_NEW "
title="NEW - DoS attack based on using SVG to generate invalid pointers from a _cairo_image_surface in write_png"
href="https://bugs.freedesktop.org/show_bug.cgi?id=98165">bug 98165</a>
from <span class="vcard"><a class="email" href="mailto:bryce@osg.samsung.com" title="Bryce Harrington <bryce@osg.samsung.com>"> <span class="fn">Bryce Harrington</span></a>
</span></b>
<pre>Yes agreed, this fix looks ok, and this is already being carried by Debian Sid.
Carrying this in the devel tree seems like the next logical step, and if no
issues arise from the extra testing and review, it looks suitable for landing
in 1.14 stable too.
Landed:
To ssh://git.freedesktop.org/git/cairo
35fccff..38fbe62 master -> master
Given the feedback in comments 7 & 8 I'm going to leave this report open for
now as reminder to investigate further, although it might be worthwhile to
break those out as a separate bug report or two so this one can be closed.</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are the QA Contact for the bug.</li>
</ul>
</body>
</html>