[SECURITY] Fedora 17 Update: libtiff-3.9.7-2.fc17

updates at fedoraproject.org updates at fedoraproject.org
Sun May 19 02:40:19 UTC 2013


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2013-7361
2013-05-03 23:03:47
--------------------------------------------------------------------------------

Name        : libtiff
Product     : Fedora 17
Version     : 3.9.7
Release     : 2.fc17
URL         : http://www.remotesensing.org/libtiff/
Summary     : Library of functions for manipulating TIFF format image files
Description :
The libtiff package contains a library of functions for manipulating
TIFF (Tagged Image File Format) image format files.  TIFF is a widely
used file format for bitmapped images.  TIFF files usually end in the
.tif extension and they are often quite large.

The libtiff package should be installed if you need to manipulate TIFF
format image files.

--------------------------------------------------------------------------------
Update Information:

Repair minor security issues CVE-2013-1960, CVE-2013-1961
--------------------------------------------------------------------------------
ChangeLog:

* Thu May  2 2013 Tom Lane <tgl at redhat.com> 3.9.7-2
- Add upstream patches for CVE-2013-1960, CVE-2013-1961
Resolves: #958609
* Thu Dec 13 2012 Tom Lane <tgl at redhat.com> 3.9.7-1
- Update to libtiff 3.9.7 (includes previously-added security fixes)
- Add patches for CVE-2012-4447, CVE-2012-4564, CVE-2012-5581
Resolves: #880907
* Sun Jul 22 2012 Tom Lane <tgl at redhat.com> 3.9.6-2
- Add patch for CVE-2012-3401
Resolves: #841736
* Thu Jun 28 2012 Tom Lane <tgl at redhat.com> 3.9.6-1
- Update to libtiff 3.9.6, and add patches for CVE-2012-2088, CVE-2012-2113
Resolves: #832866
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #952131 - CVE-2013-1961 libtiff (tiff2pdf): Stack-based buffer overflow with malformed image-length and resolution
        https://bugzilla.redhat.com/show_bug.cgi?id=952131
  [ 2 ] Bug #952158 - CVE-2013-1960 libtiff (tiff2pdf): Heap-based buffer overflow in t2_process_jpeg_strip()
        https://bugzilla.redhat.com/show_bug.cgi?id=952158
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update libtiff' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list