Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in libtiff
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in libtiff
ID: FEDORA-2013-7361
Distribution: Fedora
Plattformen: Fedora 17
Datum: So, 19. Mai 2013, 11:14
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1960
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1961
Applikationen: libtiff

Originalnachricht

Name        : libtiff
Product : Fedora 17
Version : 3.9.7
Release : 2.fc17
URL : http://www.remotesensing.org/libtiff/
Summary : Library of functions for manipulating TIFF format image files
Description :
The libtiff package contains a library of functions for manipulating
TIFF (Tagged Image File Format) image format files. TIFF is a widely
used file format for bitmapped images. TIFF files usually end in the
.tif extension and they are often quite large.

The libtiff package should be installed if you need to manipulate TIFF
format image files.

-------------------------------------------------------------------------------
-
Update Information:

Repair minor security issues CVE-2013-1960, CVE-2013-1961
-------------------------------------------------------------------------------
-
ChangeLog:

* Thu May 2 2013 Tom Lane <tgl@redhat.com> 3.9.7-2
- Add upstream patches for CVE-2013-1960, CVE-2013-1961
Resolves: #958609
* Thu Dec 13 2012 Tom Lane <tgl@redhat.com> 3.9.7-1
- Update to libtiff 3.9.7 (includes previously-added security fixes)
- Add patches for CVE-2012-4447, CVE-2012-4564, CVE-2012-5581
Resolves: #880907
* Sun Jul 22 2012 Tom Lane <tgl@redhat.com> 3.9.6-2
- Add patch for CVE-2012-3401
Resolves: #841736
* Thu Jun 28 2012 Tom Lane <tgl@redhat.com> 3.9.6-1
- Update to libtiff 3.9.6, and add patches for CVE-2012-2088, CVE-2012-2113
Resolves: #832866
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #952131 - CVE-2013-1961 libtiff (tiff2pdf): Stack-based buffer
overflow with malformed image-length and resolution
https://bugzilla.redhat.com/show_bug.cgi?id=952131
[ 2 ] Bug #952158 - CVE-2013-1960 libtiff (tiff2pdf): Heap-based buffer
overflow in t2_process_jpeg_strip()
https://bugzilla.redhat.com/show_bug.cgi?id=952158
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update libtiff' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung