aboutsummaryrefslogtreecommitdiffstats
path: root/shells/bush/distinfo
stat options
Period:
Authors:

Commits per author per week (path 'shells/bush/distinfo')

AuthorW05 2025W06 2025W07 2025W08 2025Total
Total00000
t/cgit.cgi/freebsd-ports-gnome/commit/x11-toolkits/pango/files?id=57d1c31a5ee9db75c092666574d0bd9eecbef487'>x11-toolkits/pango: Update to 1.48.4Neel Chauhan2021-05-257-344/+0 | | | | Differential Revision: https://reviews.freebsd.org/D29794 * x11/toolcits-pango: Actually apply security patchNiclas Zeising2020-09-261-2/+2 | | | | | | | | | | | Rename the patch that fixes CVE-2010-1010238 so that it is actually applied when building pango. Regenerate it using make makepatch bump portrevision Reported by: tobik MFH: 2020Q3 (implicit, security fix) Security: 456375e1-cd09-11ea-9172-4c72b94353b5 * SECURITY UPDATE: Buffer overflowJochen Neumeister2020-07-241-0/+16 | | | | | | | | | | | Gnome Pango 1.42 and later is affected by: Buffer Overflow. The impact is: The heap based buffer overflow can be used to get code execution. The component is: function name: pango_log2vis_get_embedding_levels, assignment of nchars and the loop condition. The attack vector is: Bug can be used when application pass invalid utf-8 strings to functions like pango_itemize. PR: 239563 Reported by: Miyashita Touka <imagin8r@protonmail.com> Approved by: gnome (maintainer timeout) MFH: 2020Q3 Security: 456375e1-cd09-11ea-9172-4c72b94353b5 Sponsored by: Netzkommune GmbH * x11-toolkits/pango: improve docs/meson.buildSteve Wills2020-02-021-7/+24 | | | | | | | | No change to package, so no PORTREVISION bump PR: 237822 Submitted by: John Hein <jcfyecrayz@liamekaens.com> Approved by: gnome@ (maintainer timeout, > 3 weeks)