[MacPorts] #61843: /opt/local/var/macports/software/gdk-pixbuf2/gdk-pixbuf2-2.42.0_0+x11.darwin_15.x86_64.tbz2: BC.Gif.Exploit.Agent-1425366.Agent FOUND
MacPorts
noreply at macports.org
Thu Jul 21 20:31:54 UTC 2022
#61843: /opt/local/var/macports/software/gdk-pixbuf2/gdk-
pixbuf2-2.42.0_0+x11.darwin_15.x86_64.tbz2:
BC.Gif.Exploit.Agent-1425366.Agent FOUND
--------------------------+---------------------
Reporter: dbl001 | Owner: mascguy
Type: defect | Status: closed
Priority: Normal | Milestone:
Component: ports | Version: 2.6.4
Resolution: invalid | Keywords:
Port: gdk-pixbuf2 |
--------------------------+---------------------
Changes (by mascguy):
* status: assigned => closed
* resolution: => invalid
Comment:
Replying to [comment:3 michaelld]:
> Thanks for the report. Let me quote from the GenToo bug report, since
it's relevant here:
>
> "there's nothing we can do about it:
>
> Upstream has added a test case for
https://bugzilla.gnome.org/show_bug.cgi?id=775693. However, the test could
also be used as exploit, that's why clamav is detecting that file.
>
> Because there's a valid reason for ClamAV to detect that code and
there's a valid reason for gdk-pixbuf upstream to carry such a test, we
cannot do anything."
Closing, since there's nothing we can do to fix this.
--
Ticket URL: <https://trac.macports.org/ticket/61843#comment:5>
MacPorts <https://www.macports.org/>
Ports system for macOS
More information about the macports-tickets
mailing list