summaryrefslogtreecommitdiff
path: root/pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
diff options
context:
space:
mode:
authorPierre Bourdon <delroth@gmail.com>2023-09-12 17:25:31 +0200
committerPierre Bourdon <delroth@gmail.com>2023-09-12 17:31:29 +0200
commit0f11042876c07f1abbe172d9c8fe41feedd0be9c (patch)
tree95bc7195c79bb0153050096712ca89f288d47c26 /pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
parent92f41becba5701c37372ad1a990a31893779b43d (diff)
libwebp: cherry-pick suspected upstream fix for CVE-2023-4863
This CVE is critical severity and has been exploited in the wild. It was reported as being a Chromium vulnerability, but it seems to in fact impact libwebp (and thus all its downstream users). There is however no official confirmation of this yet. The upstream fix patch (webmproject/libwebp@902bc919) does not cleanly apply onto 1.3.1, so we vendor a very slightly modified version which does cleanly apply. This is my original work, so YMMV on whether you trust it or not, reviews very much welcomed :-)
Diffstat (limited to 'pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch')
0 files changed, 0 insertions, 0 deletions