| Summary: | libtiff new security issue CVE-2012-3401 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | |
| Severity: | normal | ||
| Priority: | Normal | CC: | davidwhodgins, stormi-mageia, sysadmin-bugs, tmb |
| Version: | 2 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/507521/ | ||
| Whiteboard: | MGA1TOO MGA1-32-OK MGA1-64-OK MGA2-32-OK MGA2-64-OK | ||
| Source RPM: | libtiff-4.0.1-2.1.mga2.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2012-07-20 00:16:51 CEST
David Walser
2012-07-20 00:16:57 CEST
Whiteboard:
(none) =>
MGA1TOO I haven't found an exploit for this security vulnerability, so we are bound just to test that the update candidate still works. CC:
(none) =>
stormi I created a testing procedure for libtiff at https://wiki.mageia.org/en/QA_procedure:Libtiff based on testing reports from previous updates. Feel free to improve it. Testing complete for Mageia 1 32 bits Whiteboard:
MGA1TOO =>
MGA1TOO MGA1-32-OK I'll test Mageia 2 i586 shortly. CC:
(none) =>
davidwhodgins Testing complete for Mageia 1 64 bits Whiteboard:
MGA1TOO MGA1-32-OK =>
MGA1TOO MGA1-32-OK MGA1-64-OK Testing complete Mageia 2 i586. Whiteboard:
MGA1TOO MGA1-32-OK MGA1-64-OK =>
MGA1TOO MGA1-32-OK MGA1-64-OK MGA2-32-OK Testing complete Mageia 2 x86_64. Update validated. See comment #0 for advisory and SRPMs. No linking needed. Thanks! Keywords:
(none) =>
validated_update Update pushed: https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0181 Status:
NEW =>
RESOLVED |