* SECURITY: tiff
@ 2011-04-03 20:17 Yaakov (Cygwin/X)
2011-04-04 14:20 ` Charles Wilson
0 siblings, 1 reply; 7+ messages in thread
From: Yaakov (Cygwin/X) @ 2011-04-03 20:17 UTC (permalink / raw)
To: cygwin-apps
Chuck,
Security vulnerabilities have been announced in the tiff package. The
remedy is to update to the latest 3.9.4 release AND apply the following
patches:
http://pkgs.fedoraproject.org/gitweb/?p=libtiff.git;a=blob_plain;f=libtiff-CVE-2011-0192.patch
http://pkgs.fedoraproject.org/gitweb/?p=libtiff.git;a=blob_plain;f=libtiff-CVE-2011-1167.patch
Further information:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0192
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1167
Yaakov
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: SECURITY: tiff
2011-04-03 20:17 SECURITY: tiff Yaakov (Cygwin/X)
@ 2011-04-04 14:20 ` Charles Wilson
0 siblings, 0 replies; 7+ messages in thread
From: Charles Wilson @ 2011-04-04 14:20 UTC (permalink / raw)
To: CygWin-Apps
On 4/3/2011 4:17 PM, Yaakov (Cygwin/X) wrote:
> Security vulnerabilities have been announced in the tiff package.
Thanks for the heads up. I'll update later this week.
--
Chuck
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: SECURITY: tiff
2006-07-13 1:07 ` Yaakov S (Cygwin Ports)
2006-07-13 1:10 ` Yaakov S (Cygwin Ports)
@ 2006-07-19 21:34 ` Yaakov S (Cygwin Ports)
1 sibling, 0 replies; 7+ messages in thread
From: Yaakov S (Cygwin Ports) @ 2006-07-19 21:34 UTC (permalink / raw)
To: cygwin-apps
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Yaakov S (Cygwin Ports) wrote:
> Yaakov S (Cygwin Ports) wrote:
>>>>> Multiple vulnerabilities, ranging from integer overflows and NULL
>>>>> pointer dereferences to double frees, were reported in libTIFF.
>
> And now, there's more:
>
> A buffer overflow has been found in the t2p_write_pdf_string function in
> tiff2pdf, which can been triggered with a TIFF file containing a
> DocumentName tag with UTF-8 characters. An additional buffer overflow
> has been found in the handling of the parameters in tiffsplit.
This has been hanging for two months already, so I went ahead and added
this to Cygwin Ports CVS[1], in module ports/libs/tiff. I hope our
maintainer (Charles?) will be able to roll this out ASAP.
[1] http://sourceforge.net/cvs/?group_id=99645
Yaakov
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.1 (Cygwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFEvqVvpiWmPGlmQSMRAoeVAKDbsuue7fRRdkGst/o7m6TFXxb6gQCdHc5g
1dmXgL18cqu7H0uhOdiW5Pg=
=FGvD
-----END PGP SIGNATURE-----
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: SECURITY: tiff
2006-07-13 1:07 ` Yaakov S (Cygwin Ports)
@ 2006-07-13 1:10 ` Yaakov S (Cygwin Ports)
2006-07-19 21:34 ` Yaakov S (Cygwin Ports)
1 sibling, 0 replies; 7+ messages in thread
From: Yaakov S (Cygwin Ports) @ 2006-07-13 1:10 UTC (permalink / raw)
To: cygwin-apps
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Yaakov S (Cygwin Ports) wrote:
> Solution: update to 3.8.2 and apply the following patches:
> http://www.gentoo.org/cgi-bin/viewcvs.cgi/*checkout*/media-libs/tiff/files/tiff-3.8.2-tiffsplit.patch
> http://www.gentoo.org/cgi-bin/viewcvs.cgi/*checkout*/media-libs/tiff/files/tiff-buffer.patch
And this one too:
http://gentoo.osuosl.org/distfiles/tiff-3.8.2-tiff2pdf.patch.bz2
Yaakov
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.1 (Cygwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFEtZ1qpiWmPGlmQSMRAivzAJ9AqkcSd8iqGFHWLNti2WqZuP9a6wCfVi4U
bgdfK/5LZSiuhYXVCGLwcvQ=
=Kqmq
-----END PGP SIGNATURE-----
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: SECURITY: tiff
2006-06-14 21:14 ` Yaakov S (Cygwin Ports)
@ 2006-07-13 1:07 ` Yaakov S (Cygwin Ports)
2006-07-13 1:10 ` Yaakov S (Cygwin Ports)
2006-07-19 21:34 ` Yaakov S (Cygwin Ports)
0 siblings, 2 replies; 7+ messages in thread
From: Yaakov S (Cygwin Ports) @ 2006-07-13 1:07 UTC (permalink / raw)
To: cygwin-apps
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Yaakov S (Cygwin Ports) wrote:
>>> Multiple vulnerabilities, ranging from integer overflows and NULL
>>> pointer dereferences to double frees, were reported in libTIFF.
And now, there's more:
A buffer overflow has been found in the t2p_write_pdf_string function in
tiff2pdf, which can been triggered with a TIFF file containing a
DocumentName tag with UTF-8 characters. An additional buffer overflow
has been found in the handling of the parameters in tiffsplit.
Solution: update to 3.8.2 and apply the following patches:
http://www.gentoo.org/cgi-bin/viewcvs.cgi/*checkout*/media-libs/tiff/files/tiff-3.8.2-tiffsplit.patch
http://www.gentoo.org/cgi-bin/viewcvs.cgi/*checkout*/media-libs/tiff/files/tiff-buffer.patch
More information:
http://www.gentoo.org/security/en/glsa/glsa-200607-03.xml
http://bugs.gentoo.org/show_bug.cgi?id=135021
http://bugs.gentoo.org/show_bug.cgi?id=135881
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2193
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2656
Yaakov
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.1 (Cygwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFEtZy4piWmPGlmQSMRAo2pAJ9gEq6uMHL4j7TvhGHL+j8RyN9Y+ACcCczX
PzQldn5/cuh2WwiUn9ifBF0=
=Cztp
-----END PGP SIGNATURE-----
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: SECURITY: tiff
2006-05-30 22:26 Yaakov S (Cygwin Ports)
@ 2006-06-14 21:14 ` Yaakov S (Cygwin Ports)
2006-07-13 1:07 ` Yaakov S (Cygwin Ports)
0 siblings, 1 reply; 7+ messages in thread
From: Yaakov S (Cygwin Ports) @ 2006-06-14 21:14 UTC (permalink / raw)
To: cygwin-apps
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Yaakov S (Cygwin Ports) wrote:
> Multiple vulnerabilities, ranging from integer overflows and NULL
> pointer dereferences to double frees, were reported in libTIFF.
>
> Solution: Update to >=3.8.1.
>
> More information:
> http://www.gentoo.org/security/en/glsa/glsa-200605-17.xml
> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0405
> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2024
> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2025
> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2026
> http://bugzilla.remotesensing.org/show_bug.cgi?id=1102
Ping?
Yaakov
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.1 (Cygwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFEkHwnpiWmPGlmQSMRAnQHAJ4l/jHxC3VuXBpHyi4vav8/SOiVTwCeI1Ud
FeHLR48sZqnlkOtSXDGWV0E=
=glLU
-----END PGP SIGNATURE-----
^ permalink raw reply [flat|nested] 7+ messages in thread
* SECURITY: tiff
@ 2006-05-30 22:26 Yaakov S (Cygwin Ports)
2006-06-14 21:14 ` Yaakov S (Cygwin Ports)
0 siblings, 1 reply; 7+ messages in thread
From: Yaakov S (Cygwin Ports) @ 2006-05-30 22:26 UTC (permalink / raw)
To: cygwin-apps
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Multiple vulnerabilities, ranging from integer overflows and NULL
pointer dereferences to double frees, were reported in libTIFF.
Solution: Update to >=3.8.1.
More information:
http://www.gentoo.org/security/en/glsa/glsa-200605-17.xml
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0405
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2024
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2025
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2026
http://bugzilla.remotesensing.org/show_bug.cgi?id=1102
Yaakov
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.1 (Cygwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFEfMahpiWmPGlmQSMRAuJJAKDsj4ul7c7EmzhHh01JenjVJqQh1wCfTq4a
PWAehpW9Rd+/H2fILsjmMoI=
=YvdS
-----END PGP SIGNATURE-----
^ permalink raw reply [flat|nested] 7+ messages in thread
end of thread, other threads:[~2011-04-04 14:20 UTC | newest]
Thread overview: 7+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2011-04-03 20:17 SECURITY: tiff Yaakov (Cygwin/X)
2011-04-04 14:20 ` Charles Wilson
-- strict thread matches above, loose matches on Subject: below --
2006-05-30 22:26 Yaakov S (Cygwin Ports)
2006-06-14 21:14 ` Yaakov S (Cygwin Ports)
2006-07-13 1:07 ` Yaakov S (Cygwin Ports)
2006-07-13 1:10 ` Yaakov S (Cygwin Ports)
2006-07-19 21:34 ` Yaakov S (Cygwin Ports)
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).