Multiple vulnerabilities have been found in libTIFF, allowing remote attackers to execute arbitrary code or cause Denial of Service.
|Package||media-libs/tiff on all architectures|
|Affected versions||< 4.0.3-r6|
|Unaffected versions||>= 4.0.3-r6
revision >= 3.9.7-r1
libTIFF provides support for reading and manipulating TIFF (Tagged Image File Format) images.
Multiple vulnerabilities have been discovered in libTIFF. Please review the CVE identifiers referenced below for details.
A remote attacker could entice a user to open a specially crafted TIFF file with an application making use of libTIFF, possibly resulting in execution of arbitrary code with the privileges of the user running the application or a Denial of Service condition.
There is no known workaround at this time.
All libTIFF 4.* users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/tiff-4.0.3-r6"
All libTIFF 3.* users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/tiff-3.9.7-r1:3"
Packages which depend on this library may need to be recompiled. Tools such as revdep-rebuild may assist in identifying these packages.