Page title matches
- Some clues about testing a libtiff update candidate. A libtiff update comes usually with :735 bytes (121 words) - 15:10, 23 July 2012
Page text matches
- Some clues about testing a libtiff update candidate. A libtiff update comes usually with :735 bytes (121 words) - 15:10, 23 July 2012
- Updated libtiff packages fix security vulnerability:<br/> It was discovered that a buffer overflow in libtiff's parsing of files<br/>909 bytes (126 words) - 18:25, 29 October 2012
- Updated libtiff packages fix security vulnerability:<br/> It was discovered that LibTIFF incorrectly handled certain malformed<br/>907 bytes (132 words) - 21:41, 7 December 2012
- Updated libtiff packages fix security vulnerabilities:<br/> libtiff did not properly convert between signed and unsigned integer<br/>1 KB (211 words) - 11:59, 9 July 2012
- Updated libtiff packages fix security vulnerability:<br/> libtiff-progs-3.9.5-1.7.mga1<br/>1 KB (152 words) - 16:12, 17 November 2012
- Updated libtiff packages fix security vulnerability:<br/> libtiff-progs-3.9.5-1.5.mga1<br/>1 KB (157 words) - 11:46, 24 July 2012
- Updated libtiff packages fix security vulnerabilities:<br/> A heap-based buffer overflow flaw was found in the way tiff2pdf of libtiff<br/>2 KB (306 words) - 10:14, 9 May 2013
- | MGASA-2012-0015 || libtiff-3.9.5-1.1.mga1 || core || January 9th, 2012 | [[Support/Advisories/MGASA-2012-0137|MGASA-2012-0137]] || libtiff-3.9.5-1.4.mga1 || core || July 9th, 201244 KB (5,137 words) - 12:22, 7 December 2012
- | [[Support/Advisories/MGASA-2012-0137|MGASA-2012-0137]] || libtiff-4.0.1-2.1.mga2 || core || July 9th, 2012 | [[Support/Advisories/MGASA-2012-0181|MGASA-2012-0181]] || libtiff-4.0.1-2.2.mga2 || core || July 24th, 201272 KB (8,307 words) - 20:15, 6 June 2013