Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#37462 - [libtiff] security patch for CVE-2013-4244
Attached to Project:
Arch Linux
Opened by RbN (RbN) - Wednesday, 23 October 2013, 19:27 GMT
Last edited by Eric Belanger (Snowman) - Wednesday, 23 October 2013, 23:25 GMT
Opened by RbN (RbN) - Wednesday, 23 October 2013, 19:27 GMT
Last edited by Eric Belanger (Snowman) - Wednesday, 23 October 2013, 23:25 GMT
|
DetailsDescription :
From Mitre [0] : "The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image." Fix : patch from redhat [1] [0] : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244 [1] : https://bugzilla.redhat.com/attachment.cgi?id=786399 |
This task depends upon
Closed by Eric Belanger (Snowman)
Wednesday, 23 October 2013, 23:25 GMT
Reason for closing: Fixed
Additional comments about closing: libtiff 4.0.3-4
Wednesday, 23 October 2013, 23:25 GMT
Reason for closing: Fixed
Additional comments about closing: libtiff 4.0.3-4