[ubuntu/oneiric-security] tiff 3.9.5-1ubuntu1.2 (Accepted)

Marc Deslauriers marc.deslauriers at ubuntu.com
Thu Jul 5 14:03:33 UTC 2012


tiff (3.9.5-1ubuntu1.2) oneiric-security; urgency=low

  * SECURITY UPDATE: possible arbitrary code execution via buffer overflow
    due to type-conversion flaw (LP: #1016324)
    - debian/patches/CVE-2012-2088.patch: check for overflows in
      libtiff/tif_strip.c and libtiff/tif_tile.c.
    - CVE-2012-2088
  * SECURITY UPDATE: possible arbitrary code execution via integer
    overflows in tiff2pdf (LP: #1016324)
    - debian/patches/CVE-2012-2113.patch: check for overflows in
      tools/tiff2pdf.c.
    - CVE-2012-2113

Date: Wed, 04 Jul 2012 10:34:29 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/oneiric/+source/tiff/3.9.5-1ubuntu1.2
-------------- next part --------------
Format: 1.8
Date: Wed, 04 Jul 2012 10:34:29 -0400
Source: tiff
Binary: libtiff4 libtiffxx0c2 libtiff4-dev libtiff-tools libtiff-opengl libtiff-doc
Architecture: source
Version: 3.9.5-1ubuntu1.2
Distribution: oneiric-security
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description: 
 libtiff-doc - TIFF manipulation and conversion documentation
 libtiff-opengl - TIFF manipulation and conversion tools
 libtiff-tools - TIFF manipulation and conversion tools
 libtiff4   - Tag Image File Format (TIFF) library
 libtiff4-dev - Tag Image File Format library (TIFF), development files
 libtiffxx0c2 - Tag Image File Format (TIFF) library -- C++ interface
Launchpad-Bugs-Fixed: 1016324
Changes: 
 tiff (3.9.5-1ubuntu1.2) oneiric-security; urgency=low
 .
   * SECURITY UPDATE: possible arbitrary code execution via buffer overflow
     due to type-conversion flaw (LP: #1016324)
     - debian/patches/CVE-2012-2088.patch: check for overflows in
       libtiff/tif_strip.c and libtiff/tif_tile.c.
     - CVE-2012-2088
   * SECURITY UPDATE: possible arbitrary code execution via integer
     overflows in tiff2pdf (LP: #1016324)
     - debian/patches/CVE-2012-2113.patch: check for overflows in
       tools/tiff2pdf.c.
     - CVE-2012-2113
Checksums-Sha1: 
 969895bb8749eed2ef514e02ef3b09bdab8a9bc7 2002 tiff_3.9.5-1ubuntu1.2.dsc
 66e78ff5a914e246196d631e45756f4c7d261a89 18696 tiff_3.9.5-1ubuntu1.2.debian.tar.gz
Checksums-Sha256: 
 ee51c357c6366fc4e2078f2583837f33cdf2d070916c8fabd3d26da3eb8b57de 2002 tiff_3.9.5-1ubuntu1.2.dsc
 ad98cf3f1806da43f01a65f2d80e31b6a92ae05e9b4fb8ee5a19adc1a953dbf2 18696 tiff_3.9.5-1ubuntu1.2.debian.tar.gz
Files: 
 ef890bc598397aa3c343475449017e1e 2002 libs optional tiff_3.9.5-1ubuntu1.2.dsc
 97f161a06f003d54937a569026fba23c 18696 libs optional tiff_3.9.5-1ubuntu1.2.debian.tar.gz
Original-Maintainer: Jay Berkenbilt <qjb at debian.org>


More information about the Oneiric-changes mailing list