Browse Source

gis/gdal: Updated for version 3.10.3.

Security update: CVE-2025-29480
Buffer Overflow vulnerability in gdal 3.10.2 allows a local attacker to
cause a denial of service via the OGRSpatialReference::Release function.

Signed-off-by: ArTourter <artourter@gmail.com>
Signed-off-by: Willy Sudiarto Raharjo <willysr@slackbuilds.org>
pull/291/head
ArTourter 7 months ago
committed by Willy Sudiarto Raharjo
parent
commit
b53fc05b8c
  1. 2
      gis/gdal/gdal.SlackBuild
  2. 6
      gis/gdal/gdal.info

2
gis/gdal/gdal.SlackBuild

@ -29,7 +29,7 @@
cd $(dirname $0) ; CWD=$(pwd)
PRGNAM=gdal
VERSION=${VERSION:-3.10.2}
VERSION=${VERSION:-3.10.3}
BUILD=${BUILD:-1}
TAG=${TAG:-_SBo}
PKGTYPE=${PKGTYPE:-tgz}

6
gis/gdal/gdal.info

@ -1,8 +1,8 @@
PRGNAM="gdal"
VERSION="3.10.2"
VERSION="3.10.3"
HOMEPAGE="https://www.gdal.org/"
DOWNLOAD="https://github.com/OSGeo/gdal/releases/download/v3.10.2/gdal-3.10.2.tar.gz"
MD5SUM="882761659217c593a4a8028111b15a2a"
DOWNLOAD="https://github.com/OSGeo/gdal/releases/download/v3.10.3/gdal-3.10.3.tar.gz"
MD5SUM="16da014e47c8db37d3d2fd45409ff0ca"
DOWNLOAD_x86_64=""
MD5SUM_x86_64=""
REQUIRES="xerces-c libkml netcdf libspatialite podofo libgeotiff python3-numpy"

Loading…
Cancel
Save