Mehrere Probleme in libtiff
ID: | DSA-3844-1 |
Distribution: | Debian |
Plattformen: | Debian sid, Debian jessie |
Datum: | Mi, 3. Mai 2017, 23:44 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10269
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5225 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7598 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7593 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7600 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7601 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10267 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3658 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7602 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7594 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9535 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7597 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7596 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7599 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7595 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10270 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7592 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10266 |
Applikationen: | libtiff |
Originalnachricht |
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3844-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff May 03, 2017 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : tiff CVE ID : CVE-2016-3658 CVE-2016-9535 CVE-2016-10266 CVE-2016-10267 CVE-2016-10269 CVE-2016-10270 CVE-2017-5225 CVE-2017-7592 CVE-2017-7593 CVE-2017-7594 CVE-2017-7595 CVE-2017-7596 CVE-2017-7597 CVE-2017-7598 CVE-2017-7599 CVE-2017-7600 CVE-2017-7601 CVE-2017-7602 Multiple vulnerabilities have been discovered in the libtiff library and the included tools, which may result in denial of service, memory disclosure or the execution of arbitrary code. For the stable distribution (jessie), these problems have been fixed in version 4.0.3-12.3+deb8u3. For the upcoming stable distribution (stretch), these problems have been fixed in version 4.0.7-6. For the unstable distribution (sid), these problems have been fixed in version 4.0.7-6. We recommend that you upgrade your tiff packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlkKRdoACgkQEMKTtsN8 TjbMcw//f0VJNmMflOto4WH265ya5DVXZLqekecdrUWOBn4Q1IfzjJPsIH1eJRuc caJEbFn2qOqAauZj4KZvOKoo74tCPEiME03mcXm5CneKVMhyUYtou8GC/HqbtlFQ 0A0I/ckKUwpWci52jO6Hm643G8wj6FluHP0lvcQjj6RFxsaplrgLX+yiuRlKam65 yWkRx+9MJDHj7jWFfOazbTAJK/Ed5vUBmK3b5kaNJDfFh8ygXRldWQA3cigiYklZ xC3l04noC2u6TtKIAXAMTCrcWYOweiUHlqkINjmvE8xmRM9Sj2hEzBVYI3qcgcUv pmsOHYUcBJRcPoqNEUSYDqP3Xdf6bP2kEC4zXluaJAw/fFb2vAxn3I/E5sNREElf cNtUTWCtBvUn5UPQEIgs1FiGh4a+dqN7YWyedmOR52PXdkudPJz0K9R+PHIWClfh WnK5LUdmK7VaDO5y38HWt26rEackKpUyD+FIGo5onw4Q2slgmQg5dar5+4XzeBLj TiVzj+ffqJnqSTUrk7CBhD6BThQMmi82QzmhRouRHzkHVLekzB61fiJA7UcDwlN6 GlU4+ZMyNXU2BGxAvoKXCvN45Z3/8VdX64Q+ZQDozrepebmRI7L1xEh2/H9iSFZ/ Kp3L6iI2s4q/99blg72j27XAJMzMFaBuzfJVczgHlugkv5rA6V8= =b6ZG -----END PGP SIGNATURE----- |