New Debian libheif 1.3.2-2+deb10u3 fixes: This update addresses the following issue: 1.3.2-2+deb10u3 (Tue, 05 Nov 2024 13:20:02 -0800) * Non-maintainer upload by the Debian ELTS team. * CVE-2023-0996: Fix an issue in the strided image data parsing code whereby an attacker could use a specially-crafted image file to cause a buffer overflow via a memcpy call.
--- mirror/ftp/pool/main/libh/libheif/libheif_1.3.2-2+deb10u2.dsc +++ apt/ucs_5.0-0-errata5.0-9/source/libheif_1.3.2-2+deb10u3.dsc @@ -1,3 +1,10 @@ +1.3.2-2+deb10u3 [Tue, 05 Nov 2024 13:20:02 -0800] Chris Lamb <lamby@debian.org>: + + * Non-maintainer upload by the Debian ELTS team. + * CVE-2023-0996: Fix an issue in the strided image data parsing code whereby + an attacker could use a specially-crafted image file to cause a buffer + overflow via a memcpy call. (Closes: #1032101) + 1.3.2-2+deb10u2 [Tue, 22 Oct 2024 16:03:05 -0700] Chris Lamb <lamby@debian.org>: * Non-maintainer upload by the Debian ELTS team. <http://piuparts.knut.univention.de/5.0-9/#6872293285951486761>
OK: bug OK: yaml OK: announce_errata OK: patch OK: piuparts [5.0-9] aaa307d41c Bug #57741: libheif 1.3.2-2+deb10u3 doc/errata/staging/libheif.yaml | 13 +++++++++++++ 1 file changed, 13 insertions(+)
<https://errata.software-univention.de/#/?erratum=5.0x1167>