We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2018-19761 https://nvd.nist.gov/vuln/detail/CVE-2018-19761 https://bugzilla.redhat.com/show_bug.cgi?id=1649200
The text was updated successfully, but these errors were encountered:
Any input on this? It's been quite awhile.
Sorry, something went wrong.
It seems not security issue, just un-freed memory allocation because of corrupted sixel input. The following patch is force unreference sixel allocator: https://salsa.debian.org/debian/libsixel/blob/debian-stretch/debian/patches/0004-force-free-memory-allocator.patch
POC3 on https://bugzilla.redhat.com/attachment.cgi?id=1505141 causes integer overflow on v1.8.2. This problem is fixed on v1.8.3, with 1377517. Thanks.
No branches or pull requests
CVE-2018-19761
https://nvd.nist.gov/vuln/detail/CVE-2018-19761
https://bugzilla.redhat.com/show_bug.cgi?id=1649200
The text was updated successfully, but these errors were encountered: