Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 04 Feb 2017 12:53:55 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 216776] graphics/linux-c6-tiff: update to 3.9.4-18.el6_8
Message-ID:  <bug-216776-13@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D216776

            Bug ID: 216776
           Summary: graphics/linux-c6-tiff: update to 3.9.4-18.el6_8
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: emulation@FreeBSD.org
          Reporter: pkubaj@anongoth.pl
             Flags: maintainer-feedback?(emulation@FreeBSD.org)
          Assignee: emulation@FreeBSD.org

Created attachment 179590
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D179590&action=
=3Dedit
patch

This patch updates the port to the newest version.

Changelog:
* Multiple flaws have been discovered in libtiff. A remote attacker could
exploit these flaws to cause a crash or memory corruption and, possibly,
execute
arbitrary code by tricking an application linked against libtiff into
processing
specially crafted files. (CVE-2016-9533, CVE-2016-9534, CVE-2016-9535)

* Multiple flaws have been discovered in various libtiff tools (tiff2pdf,
tiffcrop, tiffcp, bmp2tiff). By tricking a user into processing a specially
crafted file, a remote attacker could exploit these flaws to cause a crash =
or
memory corruption and, possibly, execute arbitrary code with the privileges=
 of
the user running the libtiff tool. (CVE-2015-8870, CVE-2016-5652,
CVE-2016-9540,
CVE-2016-9537, CVE-2016-9536)

As such, MFH is necessary.

Builds fine on Poudriere on 10.3.

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-216776-13>