|
|
Subscribe / Log in / New account

Fedora alert FEDORA-2013-7361 (libtiff)

From:  updates@fedoraproject.org
To:  package-announce@lists.fedoraproject.org
Subject:  [SECURITY] Fedora 17 Update: libtiff-3.9.7-2.fc17
Date:  Sun, 19 May 2013 02:40:19 +0000
Message-ID:  <20130519024018.6358C20F03@bastion01.phx2.fedoraproject.org>
Archive‑link:  Article

-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2013-7361 2013-05-03 23:03:47 -------------------------------------------------------------------------------- Name : libtiff Product : Fedora 17 Version : 3.9.7 Release : 2.fc17 URL : http://www.remotesensing.org/libtiff/ Summary : Library of functions for manipulating TIFF format image files Description : The libtiff package contains a library of functions for manipulating TIFF (Tagged Image File Format) image format files. TIFF is a widely used file format for bitmapped images. TIFF files usually end in the .tif extension and they are often quite large. The libtiff package should be installed if you need to manipulate TIFF format image files. -------------------------------------------------------------------------------- Update Information: Repair minor security issues CVE-2013-1960, CVE-2013-1961 -------------------------------------------------------------------------------- ChangeLog: * Thu May 2 2013 Tom Lane <tgl@redhat.com> 3.9.7-2 - Add upstream patches for CVE-2013-1960, CVE-2013-1961 Resolves: #958609 * Thu Dec 13 2012 Tom Lane <tgl@redhat.com> 3.9.7-1 - Update to libtiff 3.9.7 (includes previously-added security fixes) - Add patches for CVE-2012-4447, CVE-2012-4564, CVE-2012-5581 Resolves: #880907 * Sun Jul 22 2012 Tom Lane <tgl@redhat.com> 3.9.6-2 - Add patch for CVE-2012-3401 Resolves: #841736 * Thu Jun 28 2012 Tom Lane <tgl@redhat.com> 3.9.6-1 - Update to libtiff 3.9.6, and add patches for CVE-2012-2088, CVE-2012-2113 Resolves: #832866 -------------------------------------------------------------------------------- References: [ 1 ] Bug #952131 - CVE-2013-1961 libtiff (tiff2pdf): Stack-based buffer overflow with malformed image-length and resolution https://bugzilla.redhat.com/show_bug.cgi?id=952131 [ 2 ] Bug #952158 - CVE-2013-1960 libtiff (tiff2pdf): Heap-based buffer overflow in t2_process_jpeg_strip() https://bugzilla.redhat.com/show_bug.cgi?id=952158 -------------------------------------------------------------------------------- This update can be installed with the "yum" update program. Use su -c 'yum update libtiff' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/. All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-...


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds