diff options
author | Tobias Geerinckx-Rice <me@tobias.gr> | 2018-02-23 14:24:42 +0100 |
---|---|---|
committer | Tobias Geerinckx-Rice <me@tobias.gr> | 2018-02-23 16:00:04 +0100 |
commit | bbf8832f160120d4f78b563653db49ab715e7c6c (patch) | |
tree | 217482b39ebfd4aa03f7810e1cccb18c05a66ddf /COPYING | |
parent | 5a82c904004d6db4bc3b2d294e6dacb5ac0139f8 (diff) | |
download | guix-bbf8832f160120d4f78b563653db49ab715e7c6c.tar.gz |
gnu: optipng: Update to 0.7.7 [security fixes].
This release claims to fix 2 vulnerabilities: - ‘an integer overflow vulnerability in the TIFF decoder’ (CVE-2017-1000229, previously patched in Guix), and - ‘a buffer overflow vulnerability in the GIF decoder’. * gnu/packages/image.scm (optipng): Update to 0.7.7. [source]: Remove patch. [arguments]: Substitute INVOKE for SYSTEM* and end phase with #t. * gnu/packages/patches/optipng-CVE-2017-1000229.patch: Delete file. * gnu/local.mk (dist_patch_DATA): Remove it.
Diffstat (limited to 'COPYING')
0 files changed, 0 insertions, 0 deletions