-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Yaakov S (Cygwin Ports) wrote: >>> Multiple vulnerabilities, ranging from integer overflows and NULL >>> pointer dereferences to double frees, were reported in libTIFF.
And now, there's more: A buffer overflow has been found in the t2p_write_pdf_string function in tiff2pdf, which can been triggered with a TIFF file containing a DocumentName tag with UTF-8 characters. An additional buffer overflow has been found in the handling of the parameters in tiffsplit. Solution: update to 3.8.2 and apply the following patches: http://www.gentoo.org/cgi-bin/viewcvs.cgi/*checkout*/media-libs/tiff/files/tiff-3.8.2-tiffsplit.patch http://www.gentoo.org/cgi-bin/viewcvs.cgi/*checkout*/media-libs/tiff/files/tiff-buffer.patch More information: http://www.gentoo.org/security/en/glsa/glsa-200607-03.xml http://bugs.gentoo.org/show_bug.cgi?id=135021 http://bugs.gentoo.org/show_bug.cgi?id=135881 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2193 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2656 Yaakov -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.1 (Cygwin) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFEtZy4piWmPGlmQSMRAo2pAJ9gEq6uMHL4j7TvhGHL+j8RyN9Y+ACcCczX PzQldn5/cuh2WwiUn9ifBF0= =Cztp -----END PGP SIGNATURE-----