Mageia alert MGASA-2016-0017 (libtiff)
| From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
| To: | updates-announce@ml.mageia.org | |
| Subject: | [updates-announce] MGASA-2016-0017: Updated libtiff package fixes security vulnerabilities | |
| Date: | Thu, 14 Jan 2016 02:45:14 +0100 | |
| Message-ID: | <20160114014514.2511721C247@valstar.mageia.org> |
MGASA-2016-0017 - Updated libtiff package fixes security vulnerabilities Publication date: 14 Jan 2016 URL: http://advisories.mageia.org/MGASA-2016-0017.html Type: security Affected Mageia releases: 5 CVE: CVE-2015-1547, CVE-2015-8665, CVE-2015-8683 Description: In libtiff, in tif_next.c, a potential out-of-bound write in NeXTDecode() triggered by the test case for CVE-2015-1547 (maptools bugzilla #2508). In libtiff, in tif_getimage.c, out-of-bound reads in the TIFFRGBAImage interface in case of unsupported values of SamplesPerPixel/ExtraSamples for LogLUV / CIELab (CVE-2015-8665, CVE-2015-8683). References: - https://bugs.mageia.org/show_bug.cgi?id=15519 - http://bugzilla.maptools.org/show_bug.cgi?id=2508 - http://openwall.com/lists/oss-security/2015/12/24/4 - http://openwall.com/lists/oss-security/2015/12/26/1 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1547 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8665 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8683 SRPMS: - 5/core/libtiff-4.0.6-1.2.mga5
