guix-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Libtiff CVE-2016-5652


From: Leo Famulari
Subject: Re: Libtiff CVE-2016-5652
Date: Sun, 30 Oct 2016 19:33:59 -0400
User-agent: Mutt/1.7.1 (2016-10-04)

On Sun, Oct 30, 2016 at 10:56:41PM +0100, Ludovic Courtès wrote:
> Leo Famulari <address@hidden> skribis:
> > From 7abe86a8d93e1a1ed11f14ec7ede22ce9b020611 Mon Sep 17 00:00:00 2001
> > From: Leo Famulari <address@hidden>
> > Date: Sat, 29 Oct 2016 19:23:05 -0400
> > Subject: [PATCH] gnu: libtiff: Fix CVE-2016-5652.
> >
> > * gnu/packages/patches/libtiff-CVE-2016-5652.patch: New file.
> > * gnu/local.mk (dist_patch_DATA): Add it.
> > * gnu/packages/image.scm (libtiff/fixed)[source]: Use it.
> 
> I’d say go for it.

Pushed to master and merged into core-updates. I kept it grafted on
core-updates, since changing libtiff requires ~1500 rebuilds. Oh well.
It's a good candidate for a post-release "staging" branch.

> 0 days since the last image library vulnerability…

I don't think we'll need 64 bits for this counter...



reply via email to

[Prev in Thread] Current Thread [Next in Thread]