drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in libtiff
Name: |
Pufferüberlauf in libtiff |
|
ID: |
FEDORA-2013-15673 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 18 |
|
Datum: |
Mi, 18. September 2013, 18:43 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244 |
|
Applikationen: |
libtiff |
|
Originalnachricht |
Name : libtiff Product : Fedora 18 Version : 4.0.3 Release : 9.fc18 URL : http://www.remotesensing.org/libtiff/ Summary : Library of functions for manipulating TIFF format image files Description : The libtiff package contains a library of functions for manipulating TIFF (Tagged Image File Format) image format files. TIFF is a widely used file format for bitmapped images. TIFF files usually end in the .tif extension and they are often quite large.
The libtiff package should be installed if you need to manipulate TIFF format image files.
------------------------------------------------------------------------------- - Update Information:
OOB Write in LZW decompressor Man page fixing ------------------------------------------------------------------------------- - ChangeLog:
* Mon Aug 19 2013 Petr Hracek <phracek@redhat.com> 4.0.3-9 - Add upstream patches for CVE-2013-4244 Resolves: #996468 * Wed Aug 14 2013 Petr Hracek <phracek@redhat.com> 4.0.3-8 - Bump version * Wed Aug 14 2013 Petr Hracek <phracek@redhat.com> 4.0.3-7 - Add upstream patches for CVE-2013-4231 CVE-2013-4232 Resolves: #995965 #995975 * Mon Aug 12 2013 Petr Hracek <phracek@redhat.com> - 4.0.3-6 - Manpage fixing (#510240, #510258) * Thu May 2 2013 Tom Lane <tgl@redhat.com> 4.0.3-5 - Add upstream patches for CVE-2013-1960, CVE-2013-1961 Resolves: #958609 * Fri Jan 18 2013 Adam Tkac <atkac redhat com> - 4.0.3-4 - rebuild due to "jpeg8-ABI" feature drop * Wed Dec 19 2012 Tom Lane <tgl@redhat.com> 4.0.3-3 - Add upstream patch to avoid bogus self-test failure with libjpeg-turbo v8 * Thu Dec 13 2012 Tom Lane <tgl@redhat.com> 4.0.3-2 - Add upstream patches for CVE-2012-4447, CVE-2012-4564 (note: CVE-2012-5581 is already fixed in 4.0.3) Resolves: #880907 ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #996468 - CVE-2013-4244 libtiff (gif2tiff): OOB Write in LZW decompressor https://bugzilla.redhat.com/show_bug.cgi?id=996468 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update libtiff' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|