--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2013-14726
2013-08-15 01:16:44
--------------------------------------------------------------------------------

Name        : libtiff
Product     : Fedora 18
Version     : 4.0.3
Release     : 8.fc18
URL         : http://www.remotesensing.org/libtiff/
Summary     : Library of functions for manipulating TIFF format image files
Description :
The libtiff package contains a library of functions for manipulating
TIFF (Tagged Image File Format) image format files.  TIFF is a widely
used file format for bitmapped images.  TIFF files usually end in the
.tif extension and they are often quite large.

The libtiff package should be installed if you need to manipulate TIFF
format image files.

--------------------------------------------------------------------------------
Update Information:

tiff2pdf: use-after-tree, git2tiff: stack buffer overflows
--------------------------------------------------------------------------------
ChangeLog:

* Wed Aug 14 2013 Petr Hracek <[email protected]> 4.0.3-8
- Bump version
* Wed Aug 14 2013 Petr Hracek <[email protected]> 4.0.3-7
- Add upstream patches for CVE-2013-4231 CVE-2013-4232
Resolves: #995965 #995975
* Mon Aug 12 2013 Petr Hracek <[email protected]> - 4.0.3-6
- Manpage fixing (#510240, #510258)
* Thu May  2 2013 Tom Lane <[email protected]> 4.0.3-5
- Add upstream patches for CVE-2013-1960, CVE-2013-1961
Resolves: #958609
* Fri Jan 18 2013 Adam Tkac <atkac redhat com> - 4.0.3-4
- rebuild due to "jpeg8-ABI" feature drop
* Wed Dec 19 2012 Tom Lane <[email protected]> 4.0.3-3
- Add upstream patch to avoid bogus self-test failure with libjpeg-turbo v8
* Thu Dec 13 2012 Tom Lane <[email protected]> 4.0.3-2
- Add upstream patches for CVE-2012-4447, CVE-2012-4564
  (note: CVE-2012-5581 is already fixed in 4.0.3)
Resolves: #880907
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #995965 - CVE-2013-4231 libtiff (gif2tiff): Stack buffer overflows 
due to not sanitizing user input
        https://bugzilla.redhat.com/show_bug.cgi?id=995965
  [ 2 ] Bug #995975 - CVE-2013-4232 libtiff (tiff2pdf): use-after-free in 
t2p_readwrite_pdf_image()
        https://bugzilla.redhat.com/show_bug.cgi?id=995975
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update libtiff' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
[email protected]
https://admin.fedoraproject.org/mailman/listinfo/package-announce

Reply via email to