drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in libtiff
Name: |
Zwei Probleme in libtiff |
|
ID: |
FEDORA-2013-7361 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 17 |
|
Datum: |
So, 19. Mai 2013, 11:14 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1960
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1961 |
|
Applikationen: |
libtiff |
|
Originalnachricht |
Name : libtiff Product : Fedora 17 Version : 3.9.7 Release : 2.fc17 URL : http://www.remotesensing.org/libtiff/ Summary : Library of functions for manipulating TIFF format image files Description : The libtiff package contains a library of functions for manipulating TIFF (Tagged Image File Format) image format files. TIFF is a widely used file format for bitmapped images. TIFF files usually end in the .tif extension and they are often quite large.
The libtiff package should be installed if you need to manipulate TIFF format image files.
------------------------------------------------------------------------------- - Update Information:
Repair minor security issues CVE-2013-1960, CVE-2013-1961 ------------------------------------------------------------------------------- - ChangeLog:
* Thu May 2 2013 Tom Lane <tgl@redhat.com> 3.9.7-2 - Add upstream patches for CVE-2013-1960, CVE-2013-1961 Resolves: #958609 * Thu Dec 13 2012 Tom Lane <tgl@redhat.com> 3.9.7-1 - Update to libtiff 3.9.7 (includes previously-added security fixes) - Add patches for CVE-2012-4447, CVE-2012-4564, CVE-2012-5581 Resolves: #880907 * Sun Jul 22 2012 Tom Lane <tgl@redhat.com> 3.9.6-2 - Add patch for CVE-2012-3401 Resolves: #841736 * Thu Jun 28 2012 Tom Lane <tgl@redhat.com> 3.9.6-1 - Update to libtiff 3.9.6, and add patches for CVE-2012-2088, CVE-2012-2113 Resolves: #832866 ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #952131 - CVE-2013-1961 libtiff (tiff2pdf): Stack-based buffer overflow with malformed image-length and resolution https://bugzilla.redhat.com/show_bug.cgi?id=952131 [ 2 ] Bug #952158 - CVE-2013-1960 libtiff (tiff2pdf): Heap-based buffer overflow in t2_process_jpeg_strip() https://bugzilla.redhat.com/show_bug.cgi?id=952158 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update libtiff' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|