[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 3844-1] tiff security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3844-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
May 03, 2017                          https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : tiff
CVE ID         : CVE-2016-3658  CVE-2016-9535  CVE-2016-10266
                 CVE-2016-10267 CVE-2016-10269 CVE-2016-10270
		 CVE-2017-5225  CVE-2017-7592  CVE-2017-7593
		 CVE-2017-7594  CVE-2017-7595  CVE-2017-7596
		 CVE-2017-7597  CVE-2017-7598  CVE-2017-7599
		 CVE-2017-7600  CVE-2017-7601  CVE-2017-7602

Multiple vulnerabilities have been discovered in the libtiff library and
the included tools, which may result in denial of service, memory
disclosure or the execution of arbitrary code.

For the stable distribution (jessie), these problems have been fixed in
version 4.0.3-12.3+deb8u3.

For the upcoming stable distribution (stretch), these problems have been
fixed in version 4.0.7-6.

For the unstable distribution (sid), these problems have been fixed in
version 4.0.7-6.

We recommend that you upgrade your tiff packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=b6ZG
-----END PGP SIGNATURE-----


Reply to: