| From: |
| Mageia Updates <buildsystem-daemon@mageia.org> |
| To: |
| updates-announce@ml.mageia.org |
| Subject: |
| [updates-announce] MGASA-2012-0332: libtiff-3.9.5-1.7.mga1
(1/core), libtiff-4.0.1-2.4.mga2 (2/core) |
| Date: |
| Sat, 17 Nov 2012 17:33:48 +0100 |
| Message-ID: |
| <20121117163348.GA1298@valstar.mageia.org> |
| Archive-link: |
| Article, Thread
|
MGASA-2012-0332
Date: November 17th, 2012
Affected releases: 1, 2
Description:
Updated libtiff packages fix security vulnerability:
ppm2tiff does not check the return value of the TIFFScanlineSize function,
which allows remote attackers to cause a denial of service (crash) and
possibly execute arbitrary code via a crafted PPM image that triggers an
integer overflow, a zero-memory allocation, and a heap-based buffer
overflow
(CVE-2012-4564).
Updated Packages:
Mageia 1:
lib(64)tiff3-3.9.5-1.7.mga1
lib(64)tiff-devel-3.9.5-1.7.mga1
lib(64)tiff-static-devel-3.9.5-1.7.mga1
libtiff-progs-3.9.5-1.7.mga1
Mageia 2:
lib(64)tiff5-4.0.1-2.4.mga2
lib(64)tiff-devel-4.0.1-2.4.mga2
lib(64)tiff-static-devel-4.0.1-2.4.mga2
libtiff-progs-4.0.1-2.4.mga2
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4564
http://www.ubuntu.com/usn/usn-1631-1/
https://bugs.mageia.org/show_bug.cgi?id=8087
https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-...
(
Log in to post comments)