Login
Newsletter
Werbung

Sicherheit: Pufferüberläufe in libtiff
Aktuelle Meldungen Distributionen
Name: Pufferüberläufe in libtiff
ID: FEDORA-2013-14726
Distribution: Fedora
Plattformen: Fedora 18
Datum: So, 18. August 2013, 13:47
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232
Applikationen: libtiff

Originalnachricht

Name        : libtiff
Product : Fedora 18
Version : 4.0.3
Release : 8.fc18
URL : http://www.remotesensing.org/libtiff/
Summary : Library of functions for manipulating TIFF format image files
Description :
The libtiff package contains a library of functions for manipulating
TIFF (Tagged Image File Format) image format files. TIFF is a widely
used file format for bitmapped images. TIFF files usually end in the
.tif extension and they are often quite large.

The libtiff package should be installed if you need to manipulate TIFF
format image files.

-------------------------------------------------------------------------------
-
Update Information:

tiff2pdf: use-after-tree, git2tiff: stack buffer overflows
-------------------------------------------------------------------------------
-
ChangeLog:

* Wed Aug 14 2013 Petr Hracek <phracek@redhat.com> 4.0.3-8
- Bump version
* Wed Aug 14 2013 Petr Hracek <phracek@redhat.com> 4.0.3-7
- Add upstream patches for CVE-2013-4231 CVE-2013-4232
Resolves: #995965 #995975
* Mon Aug 12 2013 Petr Hracek <phracek@redhat.com> - 4.0.3-6
- Manpage fixing (#510240, #510258)
* Thu May 2 2013 Tom Lane <tgl@redhat.com> 4.0.3-5
- Add upstream patches for CVE-2013-1960, CVE-2013-1961
Resolves: #958609
* Fri Jan 18 2013 Adam Tkac <atkac redhat com> - 4.0.3-4
- rebuild due to "jpeg8-ABI" feature drop
* Wed Dec 19 2012 Tom Lane <tgl@redhat.com> 4.0.3-3
- Add upstream patch to avoid bogus self-test failure with libjpeg-turbo v8
* Thu Dec 13 2012 Tom Lane <tgl@redhat.com> 4.0.3-2
- Add upstream patches for CVE-2012-4447, CVE-2012-4564
(note: CVE-2012-5581 is already fixed in 4.0.3)
Resolves: #880907
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #995965 - CVE-2013-4231 libtiff (gif2tiff): Stack buffer overflows
due to not sanitizing user input
https://bugzilla.redhat.com/show_bug.cgi?id=995965
[ 2 ] Bug #995975 - CVE-2013-4232 libtiff (tiff2pdf): use-after-free in
t2p_readwrite_pdf_image()
https://bugzilla.redhat.com/show_bug.cgi?id=995975
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update libtiff' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung