Accepted tiff 4.5.0-5 (source) into unstable
- To: debian-devel-changes@lists.debian.org
- Subject: Accepted tiff 4.5.0-5 (source) into unstable
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Sun, 19 Feb 2023 11:21:16 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: tiff_4.5.0-5_source.changes
- Debian-source: tiff
- Debian-suite: unstable
- Debian-version: 4.5.0-5
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=PE8NkHtHrtfa/Pu+DiBExXeaI7pIgWemnlgpOLvnJtM=; b=sC008SoSEA4dk7vBOLXKGJWbTX 2gYqDZ2bdbzgCshrWDYe8wogC4cyMcrkQoBMuzU+i1K5mBqbH7a2Bio1pezFYWiyQX+LxBdj5hZ+A so8/o+pLYc3YxCLv6ed7eS7cq3Z6C7lTXetuaRz4LFjq8IhuZCGpYhJ70GM1g68Lc0EScp1ovVon8 bbe+qUCMv+D5KFQu7NXs2bRFpcP8ViEzTVuNfWq1CijnNu8d6WBi4PdflLOngp6OS3q42qtO8mOkJ jwVBLgOfiYG5F9cJpe2mxo/qE1Mnq5wYeg9bsV6stQjpnYJD2mcESLhqLLcnSQP0nUuruooCLWQJy rpULb5kw==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1pThkq-00DANd-Sd@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 19 Feb 2023 08:46:38 +0100
Source: tiff
Architecture: source
Version: 4.5.0-5
Distribution: unstable
Urgency: high
Maintainer: Laszlo Boszormenyi (GCS) <gcs@debian.org>
Changed-By: Laszlo Boszormenyi (GCS) <gcs@debian.org>
Changes:
tiff (4.5.0-5) unstable; urgency=high
.
* Backport fix for tiffcrop correctly update buffersize after
rotateImage() .
* Backport fix for TIFFClose() avoid NULL pointer dereferencing.
* Backport security fix for CVE-2023-0800, CVE-2023-0801, CVE-2023-0802,
CVE-2023-0803 and CVE-2023-0804, an out-of-bounds write in tiffcrop
allows attackers to cause a denial-of-service via a crafted tiff file.
* Backport security fix for CVE-2023-0795, CVE-2023-0796, CVE-2023-0797,
CVE-2023-0798 and CVE-2023-0799, an out-of-bounds read in tiffcrop allows
attackers to cause a denial-of-service via a crafted tiff file.
Checksums-Sha1:
b3b1716db9aa82f059c572ea11e54e6295bdc7b0 2255 tiff_4.5.0-5.dsc
fac9b0cb1427ae690291dae6a77abdd595077ef6 26516 tiff_4.5.0-5.debian.tar.xz
Checksums-Sha256:
cec33019d88624f8ad8a771c8a4cac4b0d07f18e69171c997dab87e7c69c1914 2255 tiff_4.5.0-5.dsc
3fc31dfe0aef671343b84ce23e7baf64789e306838fb176819c18d0754b3811f 26516 tiff_4.5.0-5.debian.tar.xz
Files:
24b0187bac2b137cbf18c2a43cb338aa 2255 libs optional tiff_4.5.0-5.dsc
483a8232d27d40b821f14d2b636ebcad 26516 libs optional tiff_4.5.0-5.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=pCRD
-----END PGP SIGNATURE-----