On Sat, 2012-07-21 at 20:57 -0400, Jay Berkenbilt wrote:
> Marc Deslauriers <marc.deslauri...@ubuntu.com> wrote:
> 
> > *** /tmp/tmpgGHwFf/bug_body
> > In Ubuntu, the attached patch was applied to achieve the following:
> >
> >   * SECURITY UPDATE: possible arbitrary code execution via heap overflow
> >     in tiff2pdf.
> >     - debian/patches/CVE-2012-3401.patch: properly set t2p->t2p_error in
> >       tools/tiff2pdf.c.
> >     - CVE-2012-3401
> >
> >
> > Thanks for considering the patch.
> 
> I will try to get this patch in this weekend.  Thanks.  Note that
> tiff2pdf from the tiff3 package is not actually installed (it comes from
> the tiff package, which is 4.x), but I'll still apply the patch to avoid
> confusion.  I'll certainly apply the patch to the tiff package.
> 

Yeah, I skipped the tiff3 package in Quantal too for the same reason.

Marc.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to