| From: |
| Mageia Updates <buildsystem-daemon@mageia.org> |
| To: |
| updates-announce@ml.mageia.org |
| Subject: |
| [updates-announce] MGASA-2012-0355: libtiff-4.0.1-2.5.mga2 (2/core) |
| Date: |
| Fri, 7 Dec 2012 22:41:09 +0100 |
| Message-ID: |
| <20121207214109.GA7130@valstar.mageia.org> |
| Archive-link: |
| Article, Thread
|
MGASA-2012-0355
Date: December 7th, 2012
Affected releases: 2
Description:
Updated libtiff packages fix security vulnerability:
It was discovered that LibTIFF incorrectly handled certain malformed
images using the DOTRANGE tag. If a user or automated system were
tricked into opening a specially crafted TIFF image, a remote attacker
could crash the application, leading to a denial of service, or possibly
execute arbitrary code with user privileges (CVE-2012-5581).
Updated Packages:
lib(64)tiff5-4.0.1-2.5.mga2
lib(64)tiff-devel-4.0.1-2.5.mga2
lib(64)tiff-static-devel-4.0.1-2.5.mga2
libtiff-progs-4.0.1-2.5.mga2
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5581
http://www.ubuntu.com/usn/usn-1655-1/
https://bugs.mageia.org/show_bug.cgi?id=8317
https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-...
(
Log in to post comments)