<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>36575</bug_id>
          
          <creation_ts>2019-04-09 17:12:50 +0300</creation_ts>
          <short_desc>libtiff необходимо обновить</short_desc>
          <delta_ts>2019-04-10 03:21:53 +0300</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>4</classification_id>
          <classification>Development</classification>
          <product>Sisyphus</product>
          <component>libtiff5</component>
          <version>unstable</version>
          <rep_platform>all</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>CLOSED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc></bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords></keywords>
          <priority>P3</priority>
          <bug_severity>normal</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Dmitry V. Levin">ldv</reporter>
          <assigned_to name="Vitaly Lipatov">lav</assigned_to>
          <cc>aen</cc>
    
    <cc>lav</cc>
    
    <cc>ldv</cc>
    
    <cc>protvin</cc>
          
          <qa_contact>qa-sisyphus</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>180680</commentid>
    <comment_count>0</comment_count>
    <who name="Dmitry V. Levin">ldv</who>
    <bug_when>2019-04-09 17:12:50 +0300</bug_when>
    <thetext>4.0.3 -&gt; 4.0.10</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>180684</commentid>
    <comment_count>1</comment_count>
    <who name="AEN">aen</who>
    <bug_when>2019-04-09 18:10:38 +0300</bug_when>
    <thetext>Если с 4.0.3, то все же libtiff. libtiff5 нет в Сизифе.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>180686</commentid>
    <comment_count>2</comment_count>
    <who name="Dmitry V. Levin">ldv</who>
    <bug_when>2019-04-09 18:40:12 +0300</bug_when>
    <thetext>Наша багзилла оперерирует собранными пакетами, а не исходными.
Собранный пакет сейчас называется libtiff5.
Когда-то давно был собранный пакет libtiff, в багзилле он остался.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>180695</commentid>
    <comment_count>3</comment_count>
    <who name="Repository Robot">repository-robot</who>
    <bug_when>2019-04-10 03:21:53 +0300</bug_when>
    <thetext>libtiff-4.0.10.0.57.f9fc01c3-alt1 -&gt; sisyphus:

Tue Apr 09 2019 Vladimir D. Seleznev &lt;vseleznv@altlinux&gt; 4.0.10.0.57.f9fc01c3-alt1
- Updated to v4.0.10-57-gf9fc01c3 (ALT #36575, #34677).
- Applied SUSE patches:
  + tiff-4.0.3-seek.patch;
  + tiff-4.0.3-compress-warning.patch;
  + tiff-CVE-2018-12900.patch.
- Built with support of:
  + libjbig;
  + libwebp;
  + libzstd.
- Fixes:
  + CVE-2012-4564 Zero size buffer exploit in ppm2tiff;
  + CVE-2013-1960 Heap-based buffer overflow in the t2p_process_jpeg_strip();
  + CVE-2013-4232 Use-after-free vulnerability in the t2p_readwrite_pdf_image();
  + CVE-2013-4243 Heap-based buffer overflow in the readgifimage();
  + CVE-2013-4244 DoS or possible RCE via crafted GIF image;
  + CVE-2014-8127 Out-of-bounds read with malformed TIFF image in multiple tool;
  + CVE-2014-8129 Out-of-bounds read/write with malformed TIFF image in tiff2pdf;
  + CVE-2014-8130 Divide-by-zero error in _TIFFmalloc();
  + CVE-2014-9330 Integer overflow in tif_packbits.c in bmp2tif;
  + CVE-2015-8870 Integer overflow in tools/bmp2tiff.c (DoS or information leak);
  + CVE-2018-5360 Heap-based buffer overflow in the ReadTIFFImage().</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>