|
|
Subscribe / Log in / New account

Mageia alert MGASA-2012-0355 (libtiff)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2012-0355: libtiff-4.0.1-2.5.mga2 (2/core)
Date:  Fri, 7 Dec 2012 22:41:09 +0100
Message-ID:  <20121207214109.GA7130@valstar.mageia.org>

MGASA-2012-0355 Date: December 7th, 2012 Affected releases: 2 Description: Updated libtiff packages fix security vulnerability: It was discovered that LibTIFF incorrectly handled certain malformed images using the DOTRANGE tag. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges (CVE-2012-5581). Updated Packages: lib(64)tiff5-4.0.1-2.5.mga2 lib(64)tiff-devel-4.0.1-2.5.mga2 lib(64)tiff-static-devel-4.0.1-2.5.mga2 libtiff-progs-4.0.1-2.5.mga2 References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5581 http://www.ubuntu.com/usn/usn-1655-1/ https://bugs.mageia.org/show_bug.cgi?id=8317 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-...


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds