[SECURITY] Fedora 18 Update: libtiff-4.0.3-8.fc18

updates at fedoraproject.org updates at fedoraproject.org
Sun Aug 18 00:38:46 UTC 2013


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2013-14726
2013-08-15 01:16:44
--------------------------------------------------------------------------------

Name        : libtiff
Product     : Fedora 18
Version     : 4.0.3
Release     : 8.fc18
URL         : http://www.remotesensing.org/libtiff/
Summary     : Library of functions for manipulating TIFF format image files
Description :
The libtiff package contains a library of functions for manipulating
TIFF (Tagged Image File Format) image format files.  TIFF is a widely
used file format for bitmapped images.  TIFF files usually end in the
.tif extension and they are often quite large.

The libtiff package should be installed if you need to manipulate TIFF
format image files.

--------------------------------------------------------------------------------
Update Information:

tiff2pdf: use-after-tree, git2tiff: stack buffer overflows
--------------------------------------------------------------------------------
ChangeLog:

* Wed Aug 14 2013 Petr Hracek <phracek at redhat.com> 4.0.3-8
- Bump version
* Wed Aug 14 2013 Petr Hracek <phracek at redhat.com> 4.0.3-7
- Add upstream patches for CVE-2013-4231 CVE-2013-4232
Resolves: #995965 #995975
* Mon Aug 12 2013 Petr Hracek <phracek at redhat.com> - 4.0.3-6
- Manpage fixing (#510240, #510258)
* Thu May  2 2013 Tom Lane <tgl at redhat.com> 4.0.3-5
- Add upstream patches for CVE-2013-1960, CVE-2013-1961
Resolves: #958609
* Fri Jan 18 2013 Adam Tkac <atkac redhat com> - 4.0.3-4
- rebuild due to "jpeg8-ABI" feature drop
* Wed Dec 19 2012 Tom Lane <tgl at redhat.com> 4.0.3-3
- Add upstream patch to avoid bogus self-test failure with libjpeg-turbo v8
* Thu Dec 13 2012 Tom Lane <tgl at redhat.com> 4.0.3-2
- Add upstream patches for CVE-2012-4447, CVE-2012-4564
  (note: CVE-2012-5581 is already fixed in 4.0.3)
Resolves: #880907
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #995965 - CVE-2013-4231 libtiff (gif2tiff): Stack buffer overflows due to not sanitizing user input
        https://bugzilla.redhat.com/show_bug.cgi?id=995965
  [ 2 ] Bug #995975 - CVE-2013-4232 libtiff (tiff2pdf): use-after-free in t2p_readwrite_pdf_image()
        https://bugzilla.redhat.com/show_bug.cgi?id=995975
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update libtiff' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list