@@ -22,27 +22,27 @@ These vulnerabilities are present in the given versions:
2222
2323* [ CVE-2023 -5841] ( https://nvd.nist.gov/vuln/detail/CVE-2023-5841 ) 3.1.0, 3.1.1, 3.1.2, 3.1.3 3.1.4 3.1.5 3.1.6 3.1.7 3.1.8 3.1.9 3.1.10 3.1.11 3.2.0 3.2.1
2424* [ CVE-2021 -45942] ( https://nvd.nist.gov/vuln/detail/CVE-2021-45942 ) 3.1.0, 3.1.1, 3.1.2, 3.1.3
25- * [ CVE-2021 -20296] ( https://nvd.nist.gov/vuln/detail/CVE-2021-20296 ) 2.4.0, 2.4.1, 2.4.2, 2.5.0, 2.5.1, 2.5.2, 2.5.3
26- * [ CVE-2021 -3479] ( https://nvd.nist.gov/vuln/detail/CVE-2021-3479 ) 2.4.0, 2.4.1, 2.4.2, 2.5.0, 2.5.1, 2.5.2, 2.5.3
27- * [ CVE-2021 -3478] ( https://nvd.nist.gov/vuln/detail/CVE-2021-3478 ) 2.4.0, 2.4.1, 2.4.2, 2.5.0, 2.5.1, 2.5.2, 2.5.3
28- * [ CVE-2021 -3477] ( https://nvd.nist.gov/vuln/detail/CVE-2021-3477 ) 2.4.0, 2.4.1, 2.4.2, 2.5.0, 2.5.1, 2.5.2, 2.5.3
29- * [ CVE-2021 -3476] ( https://nvd.nist.gov/vuln/detail/CVE-2021-3476 ) 2.4.0, 2.4.1, 2.4.2, 2.5.0, 2.5.1, 2.5.2, 2.5.3
30- * [ CVE-2021 -3475] ( https://nvd.nist.gov/vuln/detail/CVE-2021-3475 ) 2.4.0, 2.4.1, 2.4.2, 2.5.0, 2.5.1, 2.5.2, 2.5.3
31- * [ CVE-2021 -3474] ( https://nvd.nist.gov/vuln/detail/CVE-2021-3474 ) 2.4.0, 2.4.1, 2.4.2, 2.5.0, 2.5.1, 2.5.2, 2.5.3
25+ * [ CVE-2021 -20296] ( https://nvd.nist.gov/vuln/detail/CVE-2021-20296 ) 2.4.0, 2.4.1, 2.4.2, 2.5.0, 2.5.1, 2.5.2, 2.5.3
26+ * [ CVE-2021 -3479] ( https://nvd.nist.gov/vuln/detail/CVE-2021-3479 ) 2.4.0, 2.4.1, 2.4.2, 2.5.0, 2.5.1, 2.5.2, 2.5.3
27+ * [ CVE-2021 -3478] ( https://nvd.nist.gov/vuln/detail/CVE-2021-3478 ) 2.4.0, 2.4.1, 2.4.2, 2.5.0, 2.5.1, 2.5.2, 2.5.3
28+ * [ CVE-2021 -3477] ( https://nvd.nist.gov/vuln/detail/CVE-2021-3477 ) 2.4.0, 2.4.1, 2.4.2, 2.5.0, 2.5.1, 2.5.2, 2.5.3
29+ * [ CVE-2021 -3476] ( https://nvd.nist.gov/vuln/detail/CVE-2021-3476 ) 2.4.0, 2.4.1, 2.4.2, 2.5.0, 2.5.1, 2.5.2, 2.5.3
30+ * [ CVE-2021 -3475] ( https://nvd.nist.gov/vuln/detail/CVE-2021-3475 ) 2.4.0, 2.4.1, 2.4.2, 2.5.0, 2.5.1, 2.5.2, 2.5.3
31+ * [ CVE-2021 -3474] ( https://nvd.nist.gov/vuln/detail/CVE-2021-3474 ) 2.4.0, 2.4.1, 2.4.2, 2.5.0, 2.5.1, 2.5.2, 2.5.3
3232* [ CVE-2020 -16589] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16589 ) 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 2.3.0
3333* [ CVE-2020 -16588] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16588 ) 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 2.3.0
3434* [ CVE-2020 -16587] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16587 ) 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 2.3.0
3535* [ CVE-2020 -15306] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15306 ) 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 2.3.0, 2.4.0, 2.4.1, 2.5.0, 2.5.1
3636* [ CVE-2020 -15305] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15305 ) 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 2.3.0, 2.4.0, 2.4.1, 2.5.0, 2.5.1
3737* [ CVE-2020 -15304] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15304 ) 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 2.3.0, 2.4.0, 2.4.1, 2.5.0, 2.5.1
38- * [ CVE-2020 -11765] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11765 ) 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 2.3.0, 2.4.0
39- * [ CVE-2020 -11764] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11764 ) 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 2.3.0, 2.4.0
40- * [ CVE-2020 -11763] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11763 ) 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 2.3.0, 2.4.0
41- * [ CVE-2020 -11762] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11762 ) 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 2.3.0, 2.4.0
42- * [ CVE-2020 -11761] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11761 ) 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 2.3.0, 2.4.0
43- * [ CVE-2020 -11760] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11760 ) 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 2.3.0, 2.4.0
44- * [ CVE-2020 -11759] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11759 ) 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 2.3.0, 2.4.0
45- * [ CVE-2020 -11758] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11758 ) 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 2.3.0, 2.4.0
38+ * [ CVE-2020 -11765] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11765 ) 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 2.3.0, 2.4.0
39+ * [ CVE-2020 -11764] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11764 ) 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 2.3.0, 2.4.0
40+ * [ CVE-2020 -11763] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11763 ) 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 2.3.0, 2.4.0
41+ * [ CVE-2020 -11762] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11762 ) 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 2.3.0, 2.4.0
42+ * [ CVE-2020 -11761] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11761 ) 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 2.3.0, 2.4.0
43+ * [ CVE-2020 -11760] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11760 ) 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 2.3.0, 2.4.0
44+ * [ CVE-2020 -11759] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11759 ) 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 2.3.0, 2.4.0
45+ * [ CVE-2020 -11758] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11758 ) 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 2.3.0, 2.4.0
4646* [ CVE-2018 -18444] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18444 ) 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 2.3.0
4747* [ CVE-2018 -18443] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18443 ) 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 2.3.0
4848* [ CVE-2017 -9116] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9116 ) 2.0.0, 2.0.1, 2.1.0, 2.2.0
@@ -108,7 +108,7 @@ To verify a downloaded release at a given tag:
108108 The website implements no interactive features and requires no login
109109 credentials.
110110
111- - The library reads and writes only to file paths specificly requested
111+ - The library reads and writes only to file paths specifically requested
112112 via the C/C++ API. The runtime library uses no system configuration
113113 files or sidecar data files. Access to data files uses only standard
114114 file I/O system calls.
@@ -140,7 +140,7 @@ to scan for dependency vulnerability.
140140Potential entry points are images being loaded using the
141141library. Malformed images could caused issues such as heap buffer
142142overflows, out-of-memory faults, or segmentation faults that could be
143- exploitable as denial-of-service attacks.
143+ exploitable as denial-of-service attacks.
144144
145145### Hardening
146146
@@ -172,6 +172,3 @@ changes are reviewed by multiple TSC members.
172172
173173The library is distributed in binary form via many common package
174174managers across all platforms.
175-
176-
177-
0 commit comments