LWN.net Logo

Mageia alert MGASA-2012-0332 (libtiff)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2012-0332: libtiff-3.9.5-1.7.mga1 (1/core), libtiff-4.0.1-2.4.mga2 (2/core)
Date:  Sat, 17 Nov 2012 17:33:48 +0100
Message-ID:  <20121117163348.GA1298@valstar.mageia.org>
Archive-link:  Article, Thread

MGASA-2012-0332 Date: November 17th, 2012 Affected releases: 1, 2 Description: Updated libtiff packages fix security vulnerability: ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow (CVE-2012-4564). Updated Packages: Mageia 1: lib(64)tiff3-3.9.5-1.7.mga1 lib(64)tiff-devel-3.9.5-1.7.mga1 lib(64)tiff-static-devel-3.9.5-1.7.mga1 libtiff-progs-3.9.5-1.7.mga1 Mageia 2: lib(64)tiff5-4.0.1-2.4.mga2 lib(64)tiff-devel-4.0.1-2.4.mga2 lib(64)tiff-static-devel-4.0.1-2.4.mga2 libtiff-progs-4.0.1-2.4.mga2 References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4564 http://www.ubuntu.com/usn/usn-1631-1/ https://bugs.mageia.org/show_bug.cgi?id=8087 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-...


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds