mirror of
git://slackware.nl/current.git
synced 2024-12-28 09:59:53 +01:00
fabd0327d1
patches/packages/LibRaw-0.20.2-x86_64-4_slack15.0.txz: Rebuilt. This update fixes security issues: A Buffer Overflow vulnerability was found in LibRaw_buffer_datastream:: gets(char*, int), which could lead to privilege escalation or application crash. A heap-buffer-overflow was found in raw2image_ex(int), which may lead to application crash by maliciously crafted input file. For more information, see: https://www.cve.org/CVERecord?id=CVE-2021-32142 https://www.cve.org/CVERecord?id=CVE-2023-1729 (* Security fix *)
22 lines
810 B
Diff
22 lines
810 B
Diff
From 9ab70f6dca19229cb5caad7cc31af4e7501bac93 Mon Sep 17 00:00:00 2001
|
|
From: Alex Tutubalin <lexa@lexa.ru>
|
|
Date: Sat, 14 Jan 2023 18:32:59 +0300
|
|
Subject: [PATCH] do not set shrink flag for 3/4 component images
|
|
|
|
---
|
|
src/preprocessing/raw2image.cpp | 2 ++
|
|
1 file changed, 2 insertions(+)
|
|
|
|
diff --git a/src/preprocessing/raw2image.cpp b/src/preprocessing/raw2image.cpp
|
|
index e65e2ad7..702cf290 100644
|
|
--- a/src/preprocessing/raw2image.cpp
|
|
+++ b/src/preprocessing/raw2image.cpp
|
|
@@ -43,6 +43,8 @@ void LibRaw::raw2image_start()
|
|
|
|
// adjust for half mode!
|
|
IO.shrink =
|
|
+ !imgdata.rawdata.color4_image && !imgdata.rawdata.color3_image &&
|
|
+ !imgdata.rawdata.float4_image && !imgdata.rawdata.float3_image &&
|
|
P1.filters &&
|
|
(O.half_size || ((O.threshold || O.aber[0] != 1 || O.aber[2] != 1)));
|
|
|