[MacPorts] #43315: glib2 @2.40.0 big_chunk_size.png reported as PNG:CVE-2013-1331 [Expl] by Avast.
#43315: glib2 @2.40.0 big_chunk_size.png reported as PNG:CVE-2013-1331 [Expl] by Avast. ----------------------------+-------------------------------- Reporter: einarjohants@… | Owner: macports-tickets@… Type: defect | Status: new Priority: Normal | Milestone: Component: ports | Version: 2.2.1 Keywords: | Port: glib2 ----------------------------+-------------------------------- After uploading to virustotal, one can see that the file in question does get some hits as a PNG exploit: https://www.virustotal.com/nb/file/960a21b47f4e9eeb44733808f43a2203ed18ae3e3... found in /opt/local/var/macports/build/_opt_local_var_macports_sources_rsync.macports.org_release_tarballs_sorts_devel_glib2/glib2/work/glib-2.40.0/gio/tests/thumbnails during build -- Ticket URL: <https://trac.macports.org/ticket/43315> MacPorts <http://www.macports.org/> Ports system for OS X
#43315: glib2 @2.40.0 big_chunk_size.png reported as PNG:CVE-2013-1331 [Expl] by Avast. -----------------------------+-------------------------- Reporter: einarjohants@… | Owner: ryandesign@… Type: defect | Status: new Priority: Normal | Milestone: Component: ports | Version: 2.2.1 Resolution: | Keywords: Port: glib2 | -----------------------------+-------------------------- Changes (by ryandesign@…): * cc: ryandesign@… (removed) * owner: macports-tickets@… => ryandesign@… Comment: This does not sound like a MacPorts-specific issue; if you feel it is a problem, please report it to the developers of glib2. -- Ticket URL: <https://trac.macports.org/ticket/43315#comment:1> MacPorts <http://www.macports.org/> Ports system for OS X
#43315: glib2 @2.40.0 big_chunk_size.png reported as PNG:CVE-2013-1331 [Expl] by Avast. -----------------------------+-------------------------- Reporter: einarjohants@… | Owner: ryandesign@… Type: defect | Status: new Priority: Normal | Milestone: Component: ports | Version: 2.2.1 Resolution: | Keywords: Port: glib2 | -----------------------------+-------------------------- Comment (by sean@…): Note that this is not malware, but a purposefully malformed PNG to test verification code in the GIO package of GLib. See [https://mail.gnome.org/archives/commits-list/2013-October/msg08162.html this page] for some details. I have the same issue with Symantec not liking that file in a clone of the GLib repository. The problem is that such malformed PNGs had been used to exploit bugs in MS Office (as indicated by the [http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=CVE-2013-1331 referenced CVE]). However, the one included with GLib has no real data in it. Agree that it should be escalated up to the GLib developers. -- Ticket URL: <https://trac.macports.org/ticket/43315#comment:2> MacPorts <http://www.macports.org/> Ports system for OS X
participants (1)
-
MacPorts