Bug 996832
Summary: | CVE-2013-4231 CVE-2013-4232 CVE-2013-4243 CVE-2013-4244 libtiff various flaws [fedora-all] | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Huzaifa S. Sidhpurwala <huzaifas> |
Component: | libtiff | Assignee: | Petr Hracek <phracek> |
Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | 19 | CC: | phracek |
Target Milestone: | --- | Keywords: | Security, SecurityTracking |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | component:libtiff | ||
Fixed In Version: | libtiff-4.0.3-10.fc19 | Doc Type: | Release Note |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2014-05-28 23:52:02 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 995965, 995975, 996052, 996468 |
Description
Huzaifa S. Sidhpurwala
2013-08-14 05:46:35 UTC
Please use the following update submission link to create the Bodhi request for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure that all associated bugs get updated when new packages are pushed to stable. Please also ensure that the "Close bugs when update is stable" option remains checked. Bodhi update submission link: https://admin.fedoraproject.org/updates/new/?type_=security&bugs=995965,996832 Adding parent bug CVE-2013-4232. Please use this new bodhi update url when correcting these flaws: https://admin.fedoraproject.org/updates/new/?type_=security&bugs=996832,995965,995975 Adding parent bug CVE-2013-4243. Please use this new bodhi update url when correcting these flaws: https://admin.fedoraproject.org/updates/new/?type_=security&bugs=996832,995965,995975,996052 Adding parent bug CVE-2013-4244. Please use this new bodhi update url when correcting these flaws: https://admin.fedoraproject.org/updates/new/?type_=security&bugs=996832,995965,995975,996052,996468 scm-commit for CVE-2013-4231 and CVE-2013-4232 rawhide: https://lists.fedoraproject.org/pipermail/scm-commits/Week-of-Mon-20130812/1092157.html CVE-2013-4244 commits: https://lists.fedoraproject.org/pipermail/scm-commits/Week-of-Mon-20130902/1103663.html https://lists.fedoraproject.org/pipermail/scm-commits/Week-of-Mon-20130902/1103750.html https://lists.fedoraproject.org/pipermail/scm-commits/Week-of-Mon-20130902/1103705.html https://lists.fedoraproject.org/pipermail/scm-commits/Week-of-Mon-20130902/1103798.html libtiff-4.0.3-15.fc20 has been submitted as an update for Fedora 20. https://admin.fedoraproject.org/updates/libtiff-4.0.3-15.fc20 libtiff-4.0.3-10.fc19 has been submitted as an update for Fedora 19. https://admin.fedoraproject.org/updates/libtiff-4.0.3-10.fc19 Package libtiff-4.0.3-15.fc20: * should fix your issue, * was pushed to the Fedora 20 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing libtiff-4.0.3-15.fc20' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/FEDORA-2014-6583/libtiff-4.0.3-15.fc20 then log in and leave karma (feedback). libtiff-4.0.3-15.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report. libtiff-4.0.3-10.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report. |