Mehrere Probleme in libTIFF
ID: | 202003-25 |
Distribution: | Gentoo |
Plattformen: | Keine Angabe |
Datum: | So, 15. März 2020, 17:41 |
Referenzen: | https://nvd.nist.gov/vuln/detail/CVE-2017-17095
https://nvd.nist.gov/vuln/detail/CVE-2019-6128 https://nvd.nist.gov/vuln/detail/CVE-2019-7663 https://nvd.nist.gov/vuln/detail/CVE-2018-19210 https://nvd.nist.gov/vuln/detail/CVE-2019-17546 |
Applikationen: | libtiff |
Originalnachricht |
|
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --0WgcPZcpdw66iskcBRdWGzsiHoK91kKcN Content-Type: multipart/mixed; boundary="e9QeLgV7sqTWuCuJdbXeciY6val1uknKw" --e9QeLgV7sqTWuCuJdbXeciY6val1uknKw Content-Type: text/plain; charset=utf-8 Content-Language: en-U Content-Transfer-Encoding: quoted-printable - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202003-25 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: libTIFF: Multiple vulnerabilities Date: March 15, 2020 Bugs: #639700, #690732, #699868 ID: 202003-25 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in LibTIFF, the worst of which could result in a Denial of Service condition. Background ========== The TIFF library contains encoding and decoding routines for the Tag Image File Format. It is called by numerous programs, including GNOME and KDE applications, to interpret TIFF images. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 media-libs/tiff < 4.1.0 >= 4.1.0 Description =========== Multiple vulnerabilities have been discovered in libTIFF. Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker, by enticing the user to process a specially crafted TIFF file, could possibly cause a Denial of Service condition. Workaround ========== There is no known workaround at this time. Resolution ========== All libTIFF users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/tiff-4.1.0" References ========== [ 1 ] CVE-2017-17095 https://nvd.nist.gov/vuln/detail/CVE-2017-17095 [ 2 ] CVE-2018-19210 https://nvd.nist.gov/vuln/detail/CVE-2018-19210 [ 3 ] CVE-2019-17546 https://nvd.nist.gov/vuln/detail/CVE-2019-17546 [ 4 ] CVE-2019-6128 https://nvd.nist.gov/vuln/detail/CVE-2019-6128 [ 5 ] CVE-2019-7663 https://nvd.nist.gov/vuln/detail/CVE-2019-7663 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202003-25 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2020 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 --e9QeLgV7sqTWuCuJdbXeciY6val1uknKw-- --0WgcPZcpdw66iskcBRdWGzsiHoK91kKcN Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQGTBAEBCgB9FiEEExKRzo+LDXJgXHuURObr3Jv2BVkFAl5uRUxfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDEz MTI5MUNFOEY4QjBENzI2MDVDN0I5NDQ0RTZFQkRDOUJGNjA1NTkACgkQRObr3Jv2 BVkOzgf6A6jXU4f8//p7uJqra1APssrm/tFpgxR6BpYWPWdJRr1j55dLQfR8thyF iQ4aa07O+/JEXmecSoKw4lsVQeMBiSFM6RiTOYEa0zp5DCWFhaVT3UkVMojPmLpq oGtmr0GI62cpho/FsIL7h+DBu2bAGA1POkSCJ6EDVvCz437gqDn/eSQBJg867ta/ zPhZAzXt7ZhTghL6d2sZ3Wi0QxlPkdzT+6mPENWWJx2iINSl0EbxH9InAURvlnCb siXHSWDVWOI3b31J+qErpYVBksmkPjXcaPqogUiLFRILwCL/OItqIGdxMe2Sav7E PneJdSd9WXx120DozQwqs2bRd0+T9Q== =MGX2 -----END PGP SIGNATURE----- --0WgcPZcpdw66iskcBRdWGzsiHoK91kKcN-- |