[ubuntu/lucid-security] tiff 3.9.2-2ubuntu0.9 (Accepted)

Marc Deslauriers marc.deslauriers at ubuntu.com
Thu Jul 5 14:03:49 UTC 2012


tiff (3.9.2-2ubuntu0.9) lucid-security; urgency=low

  * SECURITY UPDATE: possible arbitrary code execution via buffer overflow
    due to type-conversion flaw (LP: #1016324)
    - debian/patches/CVE-2012-2088.patch: check for overflows in
      libtiff/tif_strip.c and libtiff/tif_tile.c.
    - CVE-2012-2088
  * SECURITY UPDATE: possible arbitrary code execution via integer
    overflows in tiff2pdf (LP: #1016324)
    - debian/patches/CVE-2012-2113.patch: check for overflows in
      tools/tiff2pdf.c.
    - CVE-2012-2113

Date: Wed, 04 Jul 2012 11:03:33 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/lucid/+source/tiff/3.9.2-2ubuntu0.9
-------------- next part --------------
Format: 1.8
Date: Wed, 04 Jul 2012 11:03:33 -0400
Source: tiff
Binary: libtiff4 libtiffxx0c2 libtiff4-dev libtiff-tools libtiff-opengl libtiff-doc
Architecture: source
Version: 3.9.2-2ubuntu0.9
Distribution: lucid-security
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description: 
 libtiff-doc - TIFF manipulation and conversion documentation
 libtiff-opengl - TIFF manipulation and conversion tools
 libtiff-tools - TIFF manipulation and conversion tools
 libtiff4   - Tag Image File Format (TIFF) library
 libtiff4-dev - Tag Image File Format library (TIFF), development files
 libtiffxx0c2 - Tag Image File Format (TIFF) library -- C++ interface
Launchpad-Bugs-Fixed: 1016324 1016324
Changes: 
 tiff (3.9.2-2ubuntu0.9) lucid-security; urgency=low
 .
   * SECURITY UPDATE: possible arbitrary code execution via buffer overflow
     due to type-conversion flaw (LP: #1016324)
     - debian/patches/CVE-2012-2088.patch: check for overflows in
       libtiff/tif_strip.c and libtiff/tif_tile.c.
     - CVE-2012-2088
   * SECURITY UPDATE: possible arbitrary code execution via integer
     overflows in tiff2pdf (LP: #1016324)
     - debian/patches/CVE-2012-2113.patch: check for overflows in
       tools/tiff2pdf.c.
     - CVE-2012-2113
Checksums-Sha1: 
 5f2ec44231e87b04a8e080efc20e51a6fc70132b 1936 tiff_3.9.2-2ubuntu0.9.dsc
 a40a17daa7432ea34448a8d3e1ef86e988e3d37b 25447 tiff_3.9.2-2ubuntu0.9.diff.gz
Checksums-Sha256: 
 7690a819434a079541f2ff33e516ed58dc8ea6d7e61c349c00412308bf888e6b 1936 tiff_3.9.2-2ubuntu0.9.dsc
 a9735efe0b134015c89cf257284754e49b3983ec6db34401d73a6b65c9ae916f 25447 tiff_3.9.2-2ubuntu0.9.diff.gz
Files: 
 5893ed23cff19ed1a01053081e00a1e4 1936 libs optional tiff_3.9.2-2ubuntu0.9.dsc
 ad4970bf8ffab8c1dbdefb786d9343c0 25447 libs optional tiff_3.9.2-2ubuntu0.9.diff.gz
Original-Maintainer: Jay Berkenbilt <qjb at debian.org>


More information about the Lucid-changes mailing list