-
libraw (0.20.2-2ubuntu2.22.04.1) jammy-security; urgency=medium
* SECURITY UPDATE: denial of service via buffer overflow
- debian/patches/CVE-2021-32142.patch: check for input buffer size on
datastream::gets in src/libraw_datastream.cpp.
- CVE-2021-32142
* SECURITY UPDATE: heap-buffer-overflow in raw2image_ex()
- debian/patches/CVE-2023-1729.patch: do not set shrink flag for 3/4
component images in src/preprocessing/raw2image.cpp.
- CVE-2023-1729
-- Marc Deslauriers <email address hidden> Thu, 01 Jun 2023 13:03:58 -0400
-
libraw (0.20.2-2ubuntu2) jammy; urgency=high
* No change rebuild for ppc64el baseline bump.
-- Julian Andres Klode <email address hidden> Thu, 24 Mar 2022 13:14:52 +0100
-
libraw (0.20.2-2ubuntu1) jammy; urgency=medium
* Merge with/Rebase on Debian. Remaining changes:
- Mark C++ template instantiation symbols optional (LP: #1917756)
- Mark symbols as optional not seen when building with lto
libraw (0.20.2-2) unstable; urgency=medium
* debian/watch: bump version 3 -> 4
* debian/control: S-V bump 4.5.0 -> 4.6.0 (no changes needed)
* debian/libraw-doc.docs: install cpp samples (Closes: #994019)
* debian/libraw-bin.install: move sample binaries to usr/bin
* debian/NEWS: added to describe sample binaries move
* debian/rules:
- drop useless linker flags
- hardening options added
-- Heather Ellsworth <heather.ellsworth@canonical> Tue, 23 Nov 2021 20:37:09 +0000
-
libraw (0.20.2-1ubuntu3) impish; urgency=medium
* No-change rebuild to build packages with zstd compression.
-- Matthias Klose <email address hidden> Thu, 07 Oct 2021 12:17:50 +0200