- -------------------------------------------------------------------------- Debian-Edu/Skolelinux Security Advisory DESA 2005-002 http://www.skolelinux.no/security/ Finn-Arne Johansen January 6th, 2005 [EMAIL PROTECTED] - --------------------------------------------------------------------------
Package : tiff (libtiff3g) Vulnerability : unsanitised input Problem-Type : remote Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2004-1183 DSA ID : DSA-626-1 Dmitry V. Levin discovered a buffer overflow in libtiff, the Tag Image File Format library for processing TIFF graphics files. Upon reading a TIFF file it is possible to crash the application, and maybe also to execute arbitrary code. We recommend that you upgrade your libtiff3g packages. Upgrade Instructions - -------------------- Make sure the line deb http://security.debian.org/ stable/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. If you only want to upgrade libtiff3g, you may run 'apt-get install libtiff3g' to upgrade your package. - -------------------------------------------------------------------------- Mailing list: [EMAIL PROTECTED], [email protected], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show <pkg>'
signature.asc
Description: Digital signature

