182bcb3000
Changes in version 2.1 (2014-04-08) This is a security-critical bug-fix release that remains API and ABI backwards compatible to version 2.0. Users who process BIE data from untrusted sources should upgrade. - fixed a buffer-overflow vulnerability in the jbig.c decoder, reported by Florian Weimer (Red Hat): CVE-2013-6369 - fixed ability of corrupted input data to force jbig85.c decoder into an end-less loop - fixed a bug in the processing of private deterministic-prediction tables (DPPRIV=1) in jbig.c decoder - fixed integer-type mismatches in printf arguments on 64-bit systems - fuzz-testing script added
8 lines
422 B
Text
8 lines
422 B
Text
$NetBSD: distinfo,v 1.5 2014/04/10 12:04:16 obache Exp $
|
|
|
|
SHA1 (jbigkit-2.1.tar.gz) = 4864646df004e8331d19f2fa103ed731fdb6c099
|
|
RMD160 (jbigkit-2.1.tar.gz) = 71cc51fce3f65d8d9abf9ff52c29edf5469eb52f
|
|
Size (jbigkit-2.1.tar.gz) = 438710 bytes
|
|
SHA1 (patch-Makefile) = 3b5e5814be3f361b1ce5ffdd483e4078b94c4bf6
|
|
SHA1 (patch-aa) = 2f9d98f7cfd2ab9065edc2c36905b4416b3970cd
|
|
SHA1 (patch-ab) = 97550e42fdc1a358f5d3fb5b33e92ea2520b0f09
|