Debian has issued an advisory on October 21:
Mageia 1 and Mageia 2 are also affected.
Patched packages uploaded for Mageia 1, Mageia 2, and Cauldron.
Updated libtiff packages fix security vulnerability:
It was discovered that a buffer overflow in libtiff's parsing of files
using PixarLog compression could lead to the execution of arbitrary
Updated packages in core/updates_testing:
With the update, tiff support is still working fine.
Procedure here: https://wiki.mageia.org/en/QA_procedure:Libtiff
testing mga2 32
Testing complete mga2 32
testing complete mga1 32
Testing complete mga1 64
Advisory and srpms in comment 1
Could sysadmin please push from core/updates_testing to core/updates
(In reply to comment #9)
> Update pushed: