Fedora 32: dcraw FEDORA-2020-ef1ff20b59
Fedora 32: dcraw FEDORA-2020-ef1ff20b59
Fix CVE-2018-19655
-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2020-ef1ff20b59 2020-03-29 00:14:52.079997 -------------------------------------------------------------------------------- Name : dcraw Product : Fedora 32 Version : 9.28.0 Release : 9.fc32 URL : https://www.dechifro.org/dcraw/ Summary : Tool for decoding raw image data from digital cameras Description : This package contains dcraw, a command line tool to decode raw image data downloaded from digital cameras. -------------------------------------------------------------------------------- Update Information: Fix CVE-2018-19655 -------------------------------------------------------------------------------- ChangeLog: * Fri Mar 20 2020 Josef Ridky- 9.28.0-9 - Fix CVE-2018-19655 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2020-ef1ff20b59' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list -- This email address is being protected from spambots. You need JavaScript enabled to view it. To unsubscribe send an email to This email address is being protected from spambots. You need JavaScript enabled to view it. Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/This email address is being protected from spambots. You need JavaScript enabled to view it.