![]() But this is a worst case scenario, which I would rate as extremely low to occur.With some efforts an attacker possibly can create a shape file, which can lead to unintended code execution and seize your computer. ![]() The vulnerability is an out-of-bounds read, what means, if a malformed shape file is imported, the application can crash.If you are a surveyor and need the shape file support, it is safe to stay with 2.2.0 version, as long as you know the origin of the used shape files.As this is probably not a widely used plugin, the fix was just to remove the plugin.Shape files are used in surveying and so do not affect the most users. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |