Hi John,

On Wed, February 18, 2015 14:51, John Goerzen wrote:
> CVE-2013-1961 Stack-based buffer overflow in the t2p_write_pdf_page...
>   <http://security-tracker.debian.org/tracker/CVE-2013-1961>
>   - libtiff4 (remotely exploitable, high urgency)

The reason is explained when you follow this link you quote above:

[wheezy] - tiff3 <no-dsa> (the changes that [a]ffect the library are just
hardening, converting uses of sprintf to snprintf. those can be rolled
into the next tiff3 update, but a separate dsa isn't needed)

Cheers,
Thijs


-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]
Archive: 
https://lists.debian.org/[email protected]

Reply via email to