Multiple vulnerabilities in libTIFF could result in execution of arbitrary code or Denial of Service.
|Package||media-libs/tiff on all architectures|
|Affected versions||< 4.0.2-r1|
|Unaffected versions||>= 4.0.2-r1, revision >= 3.9.5-r2, revision >= 3.9.7-r1|
libTIFF provides support for reading and manipulating TIFF (Tagged Image File Format) images.
Multiple vulnerabilities have been discovered in libTIFF. Please review the CVE identifiers referenced below for details.
A remote attacker could entice a user to open a specially crafted TIFF file with an application making use of libTIFF, possibly resulting in execution of arbitrary code with the privileges of the user running the application or a Denial of Service condition.
There is no known workaround at this time.
All libTIFF 4.0 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/tiff-4.0.2-r1"
All libTIFF 3.9 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/tiff-3.9.5-r2"