Hi László
On Mon, Jul 17, 2023 at 06:36:37PM +0200, László Böszörményi (GCS) wrote:
> Hi Salvatore,
>
> On Thu, Jul 13, 2023 at 8:42 PM Salvatore Bonaccorso
> wrote:
> > On Wed, Jul 12, 2023 at 10:12:50PM +0200, László Böszörményi wrote:
> > > In short, it seems:
> > > - it's a non-dsa as only
Hi Salvatore,
On Thu, Jul 13, 2023 at 8:42 PM Salvatore Bonaccorso wrote:
> On Wed, Jul 12, 2023 at 10:12:50PM +0200, László Böszörményi wrote:
> > In short, it seems:
> > - it's a non-dsa as only a crash in a CLI tool (which has end of life now),
> > - doesn't affect the library,
> > - while 4.5
Hi László,
On Wed, Jul 12, 2023 at 10:12:50PM +0200, László Böszörményi wrote:
> Hi Salvatore,
>
> On Wed, Jul 12, 2023 at 9:39 PM Salvatore Bonaccorso
> wrote:
> > Source: tiff
> > Version: 4.5.1-1
> > CVE-2023-3618[0]:
> > | A flaw was found in libtiff. A specially crafted tiff file can lead
Hi Salvatore,
On Wed, Jul 12, 2023 at 9:39 PM Salvatore Bonaccorso wrote:
> Source: tiff
> Version: 4.5.1-1
> CVE-2023-3618[0]:
> | A flaw was found in libtiff. A specially crafted tiff file can lead
> | to a segmentation fault due to a buffer overflow in the Fax3Encode
> | function in libtiff/ti
Source: tiff
Version: 4.5.1-1
Severity: important
Tags: security upstream
Forwarded: https://gitlab.com/libtiff/libtiff/-/issues/529
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Hi,
The following vulnerability was published for tiff.
CVE-2023-3618[0]:
| A flaw was found in libtiff. A s
5 matches
Mail list logo