Thanks for the report, now fixed at source git repo:
commit 7d3c1bea895d910907e2501fe9165e353eceabae
Author: Markus Kuhn
Date: Mon Feb 15 18:27:47 2021 +
jbg_newlen(): check for end-of-file within MARKER_NEWLEN
fixes https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969593
FYI: JBIG-KIT 2.1, which fixes the printf 64-bit type problems
noted here, in addition to more serious security vulnerabilities,
will be released on 8 April 2014.
Markus
--
Markus Kuhn, Computer Laboratory, University of Cambridge
http://www.cl.cam.ac.uk/~mgk25/ || CB3 0FD, Great Britain
st the contact details of its contributor.
Hope this helps ...
Markus
--
Markus Kuhn, Computer Laboratory, University of Cambridge
http://www.cl.cam.ac.uk/~mgk25/ || CB3 0FD, Great Britain
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscr
an older Xlib
version (Debian is known for lagging a few years behind in such things).
Hence the question what xev sees.
Markus
--
Markus Kuhn, Computer Laboratory, University of Cambridge
http://www.cl.cam.ac.uk/~mgk25/ || CB3 0FD, Great Britain
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
wit
4 matches
Mail list logo