mirror of https://git.tukaani.org/xz.git
NEWS: The security fix in 5.6.3 is known as CVE-2024-47611
This commit is contained in:
parent
a04b9dd0c7
commit
b3af3297e4
4
NEWS
4
NEWS
|
@ -5,7 +5,8 @@ XZ Utils Release Notes
|
||||||
5.6.3 (2024-10-01)
|
5.6.3 (2024-10-01)
|
||||||
|
|
||||||
IMPORTANT: This includes a Windows-specific security fix to
|
IMPORTANT: This includes a Windows-specific security fix to
|
||||||
the command line tools. liblzma isn't affected by this issue.
|
the command line tools (CVE-2024-47611). liblzma isn't affected
|
||||||
|
by this issue.
|
||||||
|
|
||||||
* liblzma:
|
* liblzma:
|
||||||
|
|
||||||
|
@ -55,6 +56,7 @@ XZ Utils Release Notes
|
||||||
which can be exploited with malicious filenames to do
|
which can be exploited with malicious filenames to do
|
||||||
argument injection or directory traversal attacks.
|
argument injection or directory traversal attacks.
|
||||||
UTF-8 avoids best-fit mappings and thus fixes the issue.
|
UTF-8 avoids best-fit mappings and thus fixes the issue.
|
||||||
|
(CVE-2024-47611)
|
||||||
|
|
||||||
Forcing the process code page to UTF-8 is possible only
|
Forcing the process code page to UTF-8 is possible only
|
||||||
on Windows 10 version 1903 and later. The command line
|
on Windows 10 version 1903 and later. The command line
|
||||||
|
|
Loading…
Reference in New Issue