diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2023-10-22 19:30:42 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2023-10-23 13:30:40 +0200 |
commit | fabd0327d1c5db5ab1e3b34f03bfd65a7e91c7f6 (patch) | |
tree | 71bbe0c398455245f56d8f96c19ddbe1417f39c5 /source/l/djvulibre | |
parent | 6f8267e616b0d23914ca4f900bbcba261281447b (diff) | |
download | current-20231022193042_15.0.tar.gz current-20231022193042_15.0.tar.xz |
Sun Oct 22 19:30:42 UTC 202320231022193042_15.0
patches/packages/LibRaw-0.20.2-x86_64-4_slack15.0.txz: Rebuilt.
This update fixes security issues:
A Buffer Overflow vulnerability was found in LibRaw_buffer_datastream::
gets(char*, int), which could lead to privilege escalation or application
crash.
A heap-buffer-overflow was found in raw2image_ex(int), which may lead to
application crash by maliciously crafted input file.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2021-32142
https://www.cve.org/CVERecord?id=CVE-2023-1729
(* Security fix *)
Diffstat (limited to 'source/l/djvulibre')
0 files changed, 0 insertions, 0 deletions