Slackware: 2023-295-01: LibRaw Security Update
Summary
Here are the details from the Slackware 15.0 ChangeLog: patches/packages/LibRaw-0.20.2-i586-4_slack15.0.txz: Rebuilt. This update fixes security issues: A Buffer Overflow vulnerability was found in LibRaw_buffer_datastream:: gets(char*, int), which could lead to privilege escalation or application crash. A heap-buffer-overflow was found in raw2image_ex(int), which may lead to application crash by maliciously crafted input file. For more information, see: https://www.cve.org/CVERecord?id=CVE-2021-32142 https://www.cve.org/CVERecord?id=CVE-2023-1729 (* Security fix *)
Where Find New Packages
Thanks to the friendly folks at the OSU Open Source Lab
(https://osuosl.org/) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://www.slackware.com/ for
additional mirror sites near you.
Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/LibRaw-0.20.2-i586-4_slack15.0.txz
Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/LibRaw-0.20.2-x86_64-4_slack15.0.txz
Updated package for Slackware -current:
Updated package for Slackware x86_64 -current:
MD5 Signatures
Slackware 15.0 package:
30d1e8c89b0ecbda0a56e65b565a2de6 LibRaw-0.20.2-i586-4_slack15.0.txz
Slackware x86_64 15.0 package:
7df1cbb4d59616018a8946dc5f877094 LibRaw-0.20.2-x86_64-4_slack15.0.txz
Slackware -current package:
a20db87ccde2f271c67d0ac1b76dfaa4 l/LibRaw-0.21.1-i586-2.txz
Slackware x86_64 -current package:
2462d01b3b5be630fcfad055d206d954 l/LibRaw-0.21.1-x86_64-2.txz
![Dist Slackware](/images/distros/dist-slackware.png)
Installation Instructions
Installation instructions: Upgrade the package as root: # upgradepkg LibRaw-0.20.2-i586-4_slack15.0.txz