fix(libsixel): CVE-2026-33021, CVE-2026-33019, CVE-2026-33018#3
fix(libsixel): CVE-2026-33021, CVE-2026-33019, CVE-2026-33018#3deepin-ci-robot wants to merge 1 commit into
Conversation
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
TAG Bot TAG: 1.10.5-1deepin2 |
5036526 to
a46bc21
Compare
|
/retest github-trigger-obs-ci |
|
@hudeng-go: The
Use DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
3d9cb60 to
64c7cff
Compare
- Fix CVE-2026-33021: Use-after-free in sixel_encoder_encode_bytes() - Fix CVE-2026-33019: integer overflow lead to OOB Read in img2sixel - Fix CVE-2026-33018: Use-After-Free in load_gif() Remove redundant CVE-2025-61146.patch and CVE-2025-9300.patch. Fix 0003-fix-CVE-2026-33018.patch corruption and context mismatch. Based on patches provided by @curious-rabbit. Upstream: https://github.com/saitoha/libsixel/security/advisories Generated-By: glm-5.1 Co-Authored-By: hudeng <hudeng@deepin.org>
64c7cff to
64e5f65
Compare
Summary
This PR fixes multiple CVEs in libsixel:
sixel_encoder_encode_bytes()load_gif()Changes
sixel_encoder_encode_bytes()sixel_encoder_do_clip()gif_init_frame()to prevent UAFReferences
Labels
Generated-By: glm-5.1
Co-Authored-By: hudeng hudeng@deepin.org