Multiple vulnerabilities have been found in libTIFF, allowing remote attackers to execute arbitrary code or cause Denial of Service.
Package | media-libs/tiff on all architectures |
---|---|
Affected versions | < 4.0.3-r6 |
Unaffected versions | >= 4.0.3-r6 revision >= 3.9.7-r1 |
libTIFF provides support for reading and manipulating TIFF (Tagged Image File Format) images.
Multiple vulnerabilities have been discovered in libTIFF. Please review the CVE identifiers referenced below for details.
A remote attacker could entice a user to open a specially crafted TIFF file with an application making use of libTIFF, possibly resulting in execution of arbitrary code with the privileges of the user running the application or a Denial of Service condition.
There is no known workaround at this time.
All libTIFF 4.* users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/tiff-4.0.3-r6"
All libTIFF 3.* users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/tiff-3.9.7-r1:3"
Packages which depend on this library may need to be recompiled. Tools such as revdep-rebuild may assist in identifying these packages.