drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in libtiff
Name: |
Mehrere Probleme in libtiff |
|
ID: |
DSA-3844-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian sid, Debian jessie |
|
Datum: |
Mi, 3. Mai 2017, 23:44 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10269
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5225
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7598
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7593
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7600
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7601
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10267
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3658
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7602
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7594
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9535
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7597
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7596
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7599
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7595
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10270
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7592
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10266 |
|
Applikationen: |
libtiff |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3844-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff May 03, 2017 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : tiff CVE ID : CVE-2016-3658 CVE-2016-9535 CVE-2016-10266 CVE-2016-10267 CVE-2016-10269 CVE-2016-10270 CVE-2017-5225 CVE-2017-7592 CVE-2017-7593 CVE-2017-7594 CVE-2017-7595 CVE-2017-7596 CVE-2017-7597 CVE-2017-7598 CVE-2017-7599 CVE-2017-7600 CVE-2017-7601 CVE-2017-7602
Multiple vulnerabilities have been discovered in the libtiff library and the included tools, which may result in denial of service, memory disclosure or the execution of arbitrary code.
For the stable distribution (jessie), these problems have been fixed in version 4.0.3-12.3+deb8u3.
For the upcoming stable distribution (stretch), these problems have been fixed in version 4.0.7-6.
For the unstable distribution (sid), these problems have been fixed in version 4.0.7-6.
We recommend that you upgrade your tiff packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlkKRdoACgkQEMKTtsN8 TjbMcw//f0VJNmMflOto4WH265ya5DVXZLqekecdrUWOBn4Q1IfzjJPsIH1eJRuc caJEbFn2qOqAauZj4KZvOKoo74tCPEiME03mcXm5CneKVMhyUYtou8GC/HqbtlFQ 0A0I/ckKUwpWci52jO6Hm643G8wj6FluHP0lvcQjj6RFxsaplrgLX+yiuRlKam65 yWkRx+9MJDHj7jWFfOazbTAJK/Ed5vUBmK3b5kaNJDfFh8ygXRldWQA3cigiYklZ xC3l04noC2u6TtKIAXAMTCrcWYOweiUHlqkINjmvE8xmRM9Sj2hEzBVYI3qcgcUv pmsOHYUcBJRcPoqNEUSYDqP3Xdf6bP2kEC4zXluaJAw/fFb2vAxn3I/E5sNREElf cNtUTWCtBvUn5UPQEIgs1FiGh4a+dqN7YWyedmOR52PXdkudPJz0K9R+PHIWClfh WnK5LUdmK7VaDO5y38HWt26rEackKpUyD+FIGo5onw4Q2slgmQg5dar5+4XzeBLj TiVzj+ffqJnqSTUrk7CBhD6BThQMmi82QzmhRouRHzkHVLekzB61fiJA7UcDwlN6 GlU4+ZMyNXU2BGxAvoKXCvN45Z3/8VdX64Q+ZQDozrepebmRI7L1xEh2/H9iSFZ/ Kp3L6iI2s4q/99blg72j27XAJMzMFaBuzfJVczgHlugkv5rA6V8= =b6ZG -----END PGP SIGNATURE-----
|
|
|
|