Debian: tiff denial of service fix
Summary
--------------------------------------------------------------------------Debian Security Advisory DSA 626-1 security@debian.org http://www.debian.org/security/ Martin Schulze January 6th, 2005 http://www.debian.org/security/faq --------------------------------------------------------------------------Package : tiff Vulnerability : unsanitised input Problem-Type : remote Debian-specific: no CVE ID : CAN-2004-1183 Dmitry V. Levin discovered a buffer overflow in libtiff, the Tag Image File Format library for processing TIFF graphics files. Upon reading a TIFF file it is possible to crash the application, and maybe also to execute arbitrary code. For the stable distribution (woody) this problem has been fixed in version 3.5.5-6.woody5. For the unstable distribution (sid) this problem has been fixed in version 3.6.1-5. We recommend that you upgrade your libtiff package. Upgrade Instructions --------------------wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody -------------------------------- Source archives: Size/MD5 checksum: 637 30abd553c21fae8aa009f64c7d5c5fb7 Size/MD5 checksum: 37066 4b47449e5c15f5981121d2bb29212fc8 Size/MD5 checksum: 693641 3b7199ba793dec6ca88f38bb0c8cc4d8 Alpha architecture: Size/MD5 checksum: 141472 2e1246f3ef1525394c8c27b4cf5809f8 Size/MD5 checksum: 105420 40ae38e633c220b2d578cc2d21791c11 Size/MD5 checksum: 423234 df5bcc13ca6f61c363a452f6752e3e34 ARM architecture: Size/MD5 checksum: 117008 f89f5d1545fa5823fdb465cedce10d14 Size/MD5 checksum: 90708 8d3b23cb9262f295a3c58963ffe33c93 Size/MD5 checksum: 404256 9af23d64ad58077d4872661bbec90778 Intel IA-32 architecture: Size/MD5 checksum: 112096 7c6752fbe95e11b7c67e2bb950b04fa1 Size/MD5 checksum: 81286 c2e334518bcb0bfcf43b50490704b70c Size/MD5 checksum: 386974 75532bb3d037538763707553c306cdbe Intel IA-64 architecture: Size/MD5 checksum: 158802 7aba7243abdddfc1f1ecf59c60487fa2 Size/MD5 checksum: 135648 fac88e6eb25d46a81270d4e1865d5db6 Size/MD5 checksum: 446518 c73d407fc0ba4afa22cf31fbe61639a7 HP Precision architecture: Size/MD5 checksum: 128304 d2ee674c359384f1b53ddf9a198863f4 Size/MD5 checksum: 107050 9ddc7d795cd6aaf87ab44d4adff17d00 Size/MD5 checksum: 420374 4c2afddeb88d91f66672b9419b14e69e Motorola 680x0 architecture: Size/MD5 checksum: 107306 4d9c44ec8da6315698acc948423380ee Size/MD5 checksum: 80036 9eaa32eb605078c0772deebd35f02b2e Size/MD5 checksum: 380154 9b66e37ff70d402ae699d98d4fcefc39 Big endian MIPS architecture: Size/MD5 checksum: 124080 f058c706cd24c58aaf26c8a607b5970c Size/MD5 checksum: 88076 3c84f8da76f29eb167ce233d579a7d46 Size/MD5 checksum: 410788 d17ac2c5788fff8dbcf07bcde307a394 Little endian MIPS architecture: Size/MD5 checksum: 123676 0824a0dbca1c6e3d164d0f6f6895ca91 Size/MD5 checksum: 88440 107db6c5e16141137a3f4ca68583050e Size/MD5 checksum: 411380 0c4ecfc18395d97d1043a10e35f28bcb PowerPC architecture: Size/MD5 checksum: 116074 b217403c7eb35fc693803eb435597977 Size/MD5 checksum: 89692 e8cb99fb55ede4b7d74f0f2d43efa1f7 Size/MD5 checksum: 402422 7bc2f2471f7c1bb6c7b259cda3844359 IBM S/390 architecture: Size/MD5 checksum: 116944 654854ff01018ec39fbb459c2264dee2 Size/MD5 checksum: 92028 e3737813924d9c647e9b8ff9239dfdce Size/MD5 checksum: 395354 54a156b1986175fc95e747fd95e281aa Sun Sparc architecture: Size/MD5 checksum: 132914 677d66df3e0190f1a08e09093d136f66 Size/MD5 checksum: 88834 24e946dce29d51cc920cb7237749e195 Size/MD5 checksum: 397052 367b1261c62cd443cbfa5114b05ad593 These files will probably be moved into the stable distribution on its next update. ---------------------------------------------------------------------------------For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show' and http://packages.debian.org/