Mehrere Probleme in libtiff
ID: | USN-2939-1 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 15.10 |
Datum: | Mi, 23. März 2016, 22:01 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8783
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8665 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8782 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8683 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8784 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8781 |
Applikationen: | libtiff |
Originalnachricht |
|
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============7469036675733240911== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="EvmFLKmafcsOXRIBos83N4r4OismqlBkO" This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --EvmFLKmafcsOXRIBos83N4r4OismqlBkO Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-2939-1 March 23, 2016 tiff vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 15.10 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS Summary: LibTIFF could be made to crash or run programs as your login if it opened a specially crafted file. Software Description: - tiff: Tag Image File Format (TIFF) library Details: It was discovered that LibTIFF incorrectly handled certain malformed images. If a user or automated system were tricked into opening a specially crafted image, a remote attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 15.10: libtiff5 4.0.3-12.3ubuntu2.1 Ubuntu 14.04 LTS: libtiff5 4.0.3-7ubuntu0.4 Ubuntu 12.04 LTS: libtiff4 3.9.5-2ubuntu1.9 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2939-1 CVE-2015-8665, CVE-2015-8683, CVE-2015-8781, CVE-2015-8782, CVE-2015-8783, CVE-2015-8784 Package Information: https://launchpad.net/ubuntu/+source/tiff/4.0.3-12.3ubuntu2.1 https://launchpad.net/ubuntu/+source/tiff/4.0.3-7ubuntu0.4 https://launchpad.net/ubuntu/+source/tiff/3.9.5-2ubuntu1.9 --EvmFLKmafcsOXRIBos83N4r4OismqlBkO Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCgAGBQJW8vJ/AAoJEGVp2FWnRL6T5TQP/0iHGqebtq6ju4DYmFYuKu7Y KoofFvX9ITMkXw/Z2U5YKFDJC+G8SMjg42Qr9RXfzNgPZtJsKp3WTpo8QY6PwQA4 bHshPi8Zgc9cpdj7Vl5TjaQEH8d3UzDRcETSYmqJuDRbZbSXNpsJ8LZcM5/xlc4n kODMdboTLuqEFz0wxQ/HTThQ6zXuoI3pkZKL6fMpjeyTvAGMReLhG1S+I1l2vxt6 MZqfLEfkUaOD4cRvMyQgl0y5LiwHz0V3eHoqylkKKqsML4m1y+EutXR5xWOLuzFp +cxafKZgD91stTyKnPxCHw6JzgB9cYlef4Fpe6hg9wfd2xwcBRPWKpbnjNyN/usu Xw+1Nob65E1hDifjP0OtE6JngXRdXDSqZC/k39Vf4VaUSoDU7awD2/4b3lZshw9+ 0X1mvA4aBFyWOX8QcAtj1/ZygqBAjEF/oI8TOizmObxK+vvs3TKoozHjSowSxhNk mefNbD0K1MY6CCrTggyR8vGFfM/jiNjDlhitO8hXjXvXzoBYbSD/ICSnRKcwnpBR plck/NUVuirpUNGI30rPoe51n/N7SrLZqlCLUoyQ2rjNDS3KtParGXAlKTCL0gcn s09s2qsg9coq6RHM2SumhQVnyx7eAhVWFTVBZhdE64xGAX6SsTxnpccugEXPZE4b eP3+zKCWgxo4CO4W2WEP =Bwqs -----END PGP SIGNATURE----- --EvmFLKmafcsOXRIBos83N4r4OismqlBkO-- --===============7469036675733240911== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce --===============7469036675733240911==-- |