[MacPorts] #61843: /opt/local/var/macports/software/gdk-pixbuf2/gdk-pixbuf2-2.42.0_0+x11.darwin_15.x86_64.tbz2: BC.Gif.Exploit.Agent-1425366.Agent FOUND

MacPorts noreply at macports.org
Thu Jul 21 20:31:54 UTC 2022


#61843: /opt/local/var/macports/software/gdk-pixbuf2/gdk-
pixbuf2-2.42.0_0+x11.darwin_15.x86_64.tbz2:
BC.Gif.Exploit.Agent-1425366.Agent FOUND
--------------------------+---------------------
  Reporter:  dbl001       |      Owner:  mascguy
      Type:  defect       |     Status:  closed
  Priority:  Normal       |  Milestone:
 Component:  ports        |    Version:  2.6.4
Resolution:  invalid      |   Keywords:
      Port:  gdk-pixbuf2  |
--------------------------+---------------------
Changes (by mascguy):

 * status:  assigned => closed
 * resolution:   => invalid


Comment:

 Replying to [comment:3 michaelld]:
 > Thanks for the report. Let me quote from the GenToo bug report, since
 it's relevant here:
 >
 > "there's nothing we can do about it:
 >
 > Upstream has added a test case for
 https://bugzilla.gnome.org/show_bug.cgi?id=775693. However, the test could
 also be used as exploit, that's why clamav is detecting that file.
 >
 > Because there's a valid reason for ClamAV to detect that code and
 there's a valid reason for gdk-pixbuf upstream to carry such a test, we
 cannot do anything."

 Closing, since there's nothing we can do to fix this.

-- 
Ticket URL: <https://trac.macports.org/ticket/61843#comment:5>
MacPorts <https://www.macports.org/>
Ports system for macOS


More information about the macports-tickets mailing list