drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberläufe in libtiff
Name: |
Pufferüberläufe in libtiff |
|
ID: |
FEDORA-2013-14707 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 19 |
|
Datum: |
So, 18. August 2013, 13:46 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232 |
|
Applikationen: |
libtiff |
|
Originalnachricht |
Name : libtiff Product : Fedora 19 Version : 4.0.3 Release : 8.fc19 URL : http://www.remotesensing.org/libtiff/ Summary : Library of functions for manipulating TIFF format image files Description : The libtiff package contains a library of functions for manipulating TIFF (Tagged Image File Format) image format files. TIFF is a widely used file format for bitmapped images. TIFF files usually end in the .tif extension and they are often quite large.
The libtiff package should be installed if you need to manipulate TIFF format image files.
------------------------------------------------------------------------------- - Update Information:
tiff2pdf: use-after-tree, gif2tiff: stack buffer overflows ------------------------------------------------------------------------------- - ChangeLog:
* Wed Aug 14 2013 Petr Hracek <phracek@redhat.com> 4.0.3-8 - Add upstream patches for CVE-2013-4231 CVE-2013-4232 Resolves: #995965 #995975 * Mon Aug 12 2013 Petr Hracek <phracek@redhat.com> - 4.0.3-7 - Manpage fixing (#510240, #510258) ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #995965 - CVE-2013-4231 libtiff (gif2tiff): Stack buffer overflows due to not sanitizing user input https://bugzilla.redhat.com/show_bug.cgi?id=995965 [ 2 ] Bug #995975 - CVE-2013-4232 libtiff (tiff2pdf): use-after-free in t2p_readwrite_pdf_image() https://bugzilla.redhat.com/show_bug.cgi?id=995975 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update libtiff' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|