diff options
| author | Zhang Peng <peng.zhang1.cn@windriver.com> | 2024-12-03 16:59:01 +0800 |
|---|---|---|
| committer | Armin Kuster <akuster808@gmail.com> | 2024-12-15 14:05:09 -0500 |
| commit | bc1a812e62b471c410ec9aa982fbb1b436de8890 (patch) | |
| tree | e03aaf00e9f1b14ec7d419668423bc07697c3639 /meta-python/recipes-devtools/python/python3-sqlparse/run-ptest | |
| parent | b143aae492677c619e81187c597c22335178830d (diff) | |
| download | meta-openembedded-bc1a812e62b471c410ec9aa982fbb1b436de8890.tar.gz | |
libgsf: upgrade 1.14.52 -> 1.14.53
Changelog:
* Compilation fixes for libxml 2.13
* Fix ABR in gsf-vba-dump.
* Teach gsf (the tool) to handle odf properties.
* Fix integer overflows affecting memory allocation.
* Add missing "DocumentStatus" ole2 property.
* Avoid some undefined C behaviour in overflow checks.
Security fixes:
CVE-2024-42415
An integer overflow vulnerability exists in the Compound Document Binary
File format parser of v1.14.52 of the GNOME Project G Structured File
Library (libgsf). A specially crafted file can result in an integer
overflow that allows for a heap-based buffer overflow when processing
the sector allocation table. This can lead to arbitrary code execution.
An attacker can provide a malicious file to trigger this vulnerability.
CVE-2024-36474
An integer overflow vulnerability exists in the Compound Document Binary
File format parser of the GNOME Project G Structured File Library
(libgsf) version v1.14.52. A specially crafted file can result in an
integer overflow when processing the directory from the file that allows
for an out-of-bounds index to be used when reading and writing to an
array. This can lead to arbitrary code execution. An attacker can
provide a malicious file to trigger this vulnerability.
Reference:
[https://gitlab.gnome.org/GNOME/libgsf/-/issues/34]
(master rev: 6ed5891c18fc78a69764af0a29ad9b5feefb1aa8)
Signed-off-by: Zhang Peng <peng.zhang1.cn@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-sqlparse/run-ptest')
0 files changed, 0 insertions, 0 deletions
