Date: Sat, 04 Feb 2017 12:53:55 +0000 From: bugzilla-noreply@freebsd.org To: emulation@FreeBSD.org Subject: maintainer-feedback requested: [Bug 216776] graphics/linux-c6-tiff: update to 3.9.4-18.el6_8 Message-ID: <bug-216776-4077-yRJDcoFiLB@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-216776-4077@https.bugs.freebsd.org/bugzilla/> References: <bug-216776-4077@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
Piotr Kubaj <pkubaj@anongoth.pl> has reassigned Bugzilla Automation <bugzilla@FreeBSD.org>'s request for maintainer-feedback to emulation@FreeBSD.org: Bug 216776: graphics/linux-c6-tiff: update to 3.9.4-18.el6_8 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D216776 --- Description --- Created attachment 179590 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D179590&action= =3Dedit patch This patch updates the port to the newest version. Changelog: * Multiple flaws have been discovered in libtiff. A remote attacker could exploit these flaws to cause a crash or memory corruption and, possibly, execute arbitrary code by tricking an application linked against libtiff into processing specially crafted files. (CVE-2016-9533, CVE-2016-9534, CVE-2016-9535) * Multiple flaws have been discovered in various libtiff tools (tiff2pdf, tiffcrop, tiffcp, bmp2tiff). By tricking a user into processing a specially crafted file, a remote attacker could exploit these flaws to cause a crash = or memory corruption and, possibly, execute arbitrary code with the privileges= of the user running the libtiff tool. (CVE-2015-8870, CVE-2016-5652, CVE-2016-9540, CVE-2016-9537, CVE-2016-9536) As such, MFH is necessary. Builds fine on Poudriere on 10.3.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-216776-4077-yRJDcoFiLB>