FS#60599 - [libtiff] [Security] arbitrary code execution (CVE-2018-18557)
Attached to Project:
Arch Linux
Opened by Remi Gacogne (rgacogne) - Friday, 26 October 2018, 12:39 GMT
Last edited by Levente Polyak (anthraxx) - Tuesday, 20 November 2018, 16:53 GMT
Opened by Remi Gacogne (rgacogne) - Friday, 26 October 2018, 12:39 GMT
Last edited by Levente Polyak (anthraxx) - Tuesday, 20 November 2018, 16:53 GMT
|
Details
Summary
======= The packages libtiff and lib32-libtiff are vulnerable to arbitrary code execution via CVE-2018-18557. Guidance ======== Since a new release is not available yet, I think it would be nice to backport the relevant patch[1] which has been merged in master[2]. References ========== [1]: https://gitlab.com/libtiff/libtiff/commit/681748ec2f5ce88da5f9fa6831e1653e46af8a66 [2]: https://gitlab.com/libtiff/libtiff/merge_requests/38 https://security.archlinux.org/AVG-790 https://bugs.chromium.org/p/project-zero/issues/detail?id=1697 |
This task depends upon
Closed by Levente Polyak (anthraxx)
Tuesday, 20 November 2018, 16:53 GMT
Reason for closing: Fixed
Additional comments about closing: 4.0.10-1
Tuesday, 20 November 2018, 16:53 GMT
Reason for closing: Fixed
Additional comments about closing: 4.0.10-1