public inbox for cygwin-apps@cygwin.com
 help / color / mirror / Atom feed
* SECURITY: tiff
@ 2011-04-03 20:17 Yaakov (Cygwin/X)
  2011-04-04 14:20 ` Charles Wilson
  0 siblings, 1 reply; 7+ messages in thread
From: Yaakov (Cygwin/X) @ 2011-04-03 20:17 UTC (permalink / raw)
  To: cygwin-apps

Chuck,

Security vulnerabilities have been announced in the tiff package.  The
remedy is to update to the latest 3.9.4 release AND apply the following
patches:

http://pkgs.fedoraproject.org/gitweb/?p=libtiff.git;a=blob_plain;f=libtiff-CVE-2011-0192.patch
http://pkgs.fedoraproject.org/gitweb/?p=libtiff.git;a=blob_plain;f=libtiff-CVE-2011-1167.patch

Further information:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0192
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1167


Yaakov


^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: SECURITY: tiff
  2011-04-03 20:17 SECURITY: tiff Yaakov (Cygwin/X)
@ 2011-04-04 14:20 ` Charles Wilson
  0 siblings, 0 replies; 7+ messages in thread
From: Charles Wilson @ 2011-04-04 14:20 UTC (permalink / raw)
  To: CygWin-Apps

On 4/3/2011 4:17 PM, Yaakov (Cygwin/X) wrote:
> Security vulnerabilities have been announced in the tiff package.

Thanks for the heads up. I'll update later this week.

--
Chuck

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: SECURITY: tiff
  2006-07-13  1:07   ` Yaakov S (Cygwin Ports)
  2006-07-13  1:10     ` Yaakov S (Cygwin Ports)
@ 2006-07-19 21:34     ` Yaakov S (Cygwin Ports)
  1 sibling, 0 replies; 7+ messages in thread
From: Yaakov S (Cygwin Ports) @ 2006-07-19 21:34 UTC (permalink / raw)
  To: cygwin-apps

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Yaakov S (Cygwin Ports) wrote:
> Yaakov S (Cygwin Ports) wrote:
>>>>> Multiple vulnerabilities, ranging from integer overflows and NULL
>>>>> pointer dereferences to double frees, were reported in libTIFF.
> 
> And now, there's more:
> 
> A buffer overflow has been found in the t2p_write_pdf_string function in
> tiff2pdf, which can been triggered with a TIFF file containing a
> DocumentName tag with UTF-8 characters. An additional buffer overflow
> has been found in the handling of the parameters in tiffsplit.

This has been hanging for two months already, so I went ahead and added
this to Cygwin Ports CVS[1], in module ports/libs/tiff.  I hope our
maintainer (Charles?) will be able to roll this out ASAP.

[1] http://sourceforge.net/cvs/?group_id=99645


Yaakov
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.1 (Cygwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFEvqVvpiWmPGlmQSMRAoeVAKDbsuue7fRRdkGst/o7m6TFXxb6gQCdHc5g
1dmXgL18cqu7H0uhOdiW5Pg=
=FGvD
-----END PGP SIGNATURE-----

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: SECURITY: tiff
  2006-07-13  1:07   ` Yaakov S (Cygwin Ports)
@ 2006-07-13  1:10     ` Yaakov S (Cygwin Ports)
  2006-07-19 21:34     ` Yaakov S (Cygwin Ports)
  1 sibling, 0 replies; 7+ messages in thread
From: Yaakov S (Cygwin Ports) @ 2006-07-13  1:10 UTC (permalink / raw)
  To: cygwin-apps

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Yaakov S (Cygwin Ports) wrote:
> Solution: update to 3.8.2 and apply the following patches:
> http://www.gentoo.org/cgi-bin/viewcvs.cgi/*checkout*/media-libs/tiff/files/tiff-3.8.2-tiffsplit.patch
> http://www.gentoo.org/cgi-bin/viewcvs.cgi/*checkout*/media-libs/tiff/files/tiff-buffer.patch

And this one too:
http://gentoo.osuosl.org/distfiles/tiff-3.8.2-tiff2pdf.patch.bz2


Yaakov

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.1 (Cygwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFEtZ1qpiWmPGlmQSMRAivzAJ9AqkcSd8iqGFHWLNti2WqZuP9a6wCfVi4U
bgdfK/5LZSiuhYXVCGLwcvQ=
=Kqmq
-----END PGP SIGNATURE-----

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: SECURITY: tiff
  2006-06-14 21:14 ` Yaakov S (Cygwin Ports)
@ 2006-07-13  1:07   ` Yaakov S (Cygwin Ports)
  2006-07-13  1:10     ` Yaakov S (Cygwin Ports)
  2006-07-19 21:34     ` Yaakov S (Cygwin Ports)
  0 siblings, 2 replies; 7+ messages in thread
From: Yaakov S (Cygwin Ports) @ 2006-07-13  1:07 UTC (permalink / raw)
  To: cygwin-apps

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Yaakov S (Cygwin Ports) wrote:
>>> Multiple vulnerabilities, ranging from integer overflows and NULL
>>> pointer dereferences to double frees, were reported in libTIFF.

And now, there's more:

A buffer overflow has been found in the t2p_write_pdf_string function in
tiff2pdf, which can been triggered with a TIFF file containing a
DocumentName tag with UTF-8 characters. An additional buffer overflow
has been found in the handling of the parameters in tiffsplit.

Solution: update to 3.8.2 and apply the following patches:
http://www.gentoo.org/cgi-bin/viewcvs.cgi/*checkout*/media-libs/tiff/files/tiff-3.8.2-tiffsplit.patch
http://www.gentoo.org/cgi-bin/viewcvs.cgi/*checkout*/media-libs/tiff/files/tiff-buffer.patch

More information:
http://www.gentoo.org/security/en/glsa/glsa-200607-03.xml
http://bugs.gentoo.org/show_bug.cgi?id=135021
http://bugs.gentoo.org/show_bug.cgi?id=135881
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2193
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2656


Yaakov
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.1 (Cygwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFEtZy4piWmPGlmQSMRAo2pAJ9gEq6uMHL4j7TvhGHL+j8RyN9Y+ACcCczX
PzQldn5/cuh2WwiUn9ifBF0=
=Cztp
-----END PGP SIGNATURE-----

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: SECURITY: tiff
  2006-05-30 22:26 Yaakov S (Cygwin Ports)
@ 2006-06-14 21:14 ` Yaakov S (Cygwin Ports)
  2006-07-13  1:07   ` Yaakov S (Cygwin Ports)
  0 siblings, 1 reply; 7+ messages in thread
From: Yaakov S (Cygwin Ports) @ 2006-06-14 21:14 UTC (permalink / raw)
  To: cygwin-apps

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Yaakov S (Cygwin Ports) wrote:
> Multiple vulnerabilities, ranging from integer overflows and NULL
> pointer dereferences to double frees, were reported in libTIFF.
> 
> Solution:  Update to >=3.8.1.
> 
> More information:
> http://www.gentoo.org/security/en/glsa/glsa-200605-17.xml
> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0405
> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2024
> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2025
> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2026
> http://bugzilla.remotesensing.org/show_bug.cgi?id=1102

Ping?


Yaakov
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.1 (Cygwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFEkHwnpiWmPGlmQSMRAnQHAJ4l/jHxC3VuXBpHyi4vav8/SOiVTwCeI1Ud
FeHLR48sZqnlkOtSXDGWV0E=
=glLU
-----END PGP SIGNATURE-----

^ permalink raw reply	[flat|nested] 7+ messages in thread

* SECURITY: tiff
@ 2006-05-30 22:26 Yaakov S (Cygwin Ports)
  2006-06-14 21:14 ` Yaakov S (Cygwin Ports)
  0 siblings, 1 reply; 7+ messages in thread
From: Yaakov S (Cygwin Ports) @ 2006-05-30 22:26 UTC (permalink / raw)
  To: cygwin-apps

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Multiple vulnerabilities, ranging from integer overflows and NULL
pointer dereferences to double frees, were reported in libTIFF.

Solution:  Update to >=3.8.1.

More information:
http://www.gentoo.org/security/en/glsa/glsa-200605-17.xml
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0405
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2024
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2025
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2026
http://bugzilla.remotesensing.org/show_bug.cgi?id=1102


Yaakov

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.1 (Cygwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFEfMahpiWmPGlmQSMRAuJJAKDsj4ul7c7EmzhHh01JenjVJqQh1wCfTq4a
PWAehpW9Rd+/H2fILsjmMoI=
=YvdS
-----END PGP SIGNATURE-----

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2011-04-04 14:20 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2011-04-03 20:17 SECURITY: tiff Yaakov (Cygwin/X)
2011-04-04 14:20 ` Charles Wilson
  -- strict thread matches above, loose matches on Subject: below --
2006-05-30 22:26 Yaakov S (Cygwin Ports)
2006-06-14 21:14 ` Yaakov S (Cygwin Ports)
2006-07-13  1:07   ` Yaakov S (Cygwin Ports)
2006-07-13  1:10     ` Yaakov S (Cygwin Ports)
2006-07-19 21:34     ` Yaakov S (Cygwin Ports)

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).