Multiple vulnerabilities in libTIFF could result in execution of arbitrary code or Denial of Service.
Package | media-libs/tiff on all architectures |
---|---|
Affected versions | < 4.0.2-r1 |
Unaffected versions | >= 4.0.2-r1 revision >= 3.9.5-r2 revision >= 3.9.7-r1 |
libTIFF provides support for reading and manipulating TIFF (Tagged Image File Format) images.
Multiple vulnerabilities have been discovered in libTIFF. Please review the CVE identifiers referenced below for details.
A remote attacker could entice a user to open a specially crafted TIFF file with an application making use of libTIFF, possibly resulting in execution of arbitrary code with the privileges of the user running the application or a Denial of Service condition.
There is no known workaround at this time.
All libTIFF 4.0 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/tiff-4.0.2-r1"
All libTIFF 3.9 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/tiff-3.9.5-r2"