diff options
| author | Pierre Bourdon <delroth@gmail.com> | 2023-09-12 17:25:31 +0200 |
|---|---|---|
| committer | Pierre Bourdon <delroth@gmail.com> | 2023-09-12 17:31:29 +0200 |
| commit | 0f11042876c07f1abbe172d9c8fe41feedd0be9c (patch) | |
| tree | 95bc7195c79bb0153050096712ca89f288d47c26 /pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch | |
| parent | 92f41becba5701c37372ad1a990a31893779b43d (diff) | |
libwebp: cherry-pick suspected upstream fix for CVE-2023-4863
This CVE is critical severity and has been exploited in the wild. It was
reported as being a Chromium vulnerability, but it seems to in fact
impact libwebp (and thus all its downstream users). There is however no
official confirmation of this yet.
The upstream fix patch (webmproject/libwebp@902bc919) does not cleanly
apply onto 1.3.1, so we vendor a very slightly modified version which
does cleanly apply. This is my original work, so YMMV on whether you
trust it or not, reviews very much welcomed :-)
Diffstat (limited to 'pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch')
0 files changed, 0 insertions, 0 deletions
